Jul 2 07:53:56.987556 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:53:56.987587 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:56.987601 kernel: BIOS-provided physical RAM map: Jul 2 07:53:56.987609 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 07:53:56.987615 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 07:53:56.987622 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 07:53:56.987630 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Jul 2 07:53:56.987637 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Jul 2 07:53:56.987646 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 07:53:56.987653 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 07:53:56.987660 kernel: NX (Execute Disable) protection: active Jul 2 07:53:56.987666 kernel: SMBIOS 2.8 present. Jul 2 07:53:56.987673 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Jul 2 07:53:56.987680 kernel: Hypervisor detected: KVM Jul 2 07:53:56.987689 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:53:56.987699 kernel: kvm-clock: cpu 0, msr 13192001, primary cpu clock Jul 2 07:53:56.987706 kernel: kvm-clock: using sched offset of 3591040958 cycles Jul 2 07:53:56.987714 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:53:56.987722 kernel: tsc: Detected 1995.307 MHz processor Jul 2 07:53:56.987729 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:53:56.987737 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:53:56.987745 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Jul 2 07:53:56.987758 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:53:56.987768 kernel: ACPI: Early table checksum verification disabled Jul 2 07:53:56.987775 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Jul 2 07:53:56.987782 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987790 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987797 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987804 kernel: ACPI: FACS 0x000000007FFE0000 000040 Jul 2 07:53:56.987811 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987819 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987826 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987835 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:53:56.987842 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Jul 2 07:53:56.987850 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Jul 2 07:53:56.987857 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Jul 2 07:53:56.987864 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Jul 2 07:53:56.987871 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Jul 2 07:53:56.987879 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Jul 2 07:53:56.987886 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Jul 2 07:53:56.987900 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:53:56.987907 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:53:56.987929 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:53:56.987943 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 2 07:53:56.987951 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Jul 2 07:53:56.987959 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Jul 2 07:53:56.987969 kernel: Zone ranges: Jul 2 07:53:56.987977 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:53:56.987985 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Jul 2 07:53:56.987993 kernel: Normal empty Jul 2 07:53:56.988001 kernel: Movable zone start for each node Jul 2 07:53:56.988008 kernel: Early memory node ranges Jul 2 07:53:56.988016 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 07:53:56.988024 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Jul 2 07:53:56.988032 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Jul 2 07:53:56.988042 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:53:56.988054 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 07:53:56.988062 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Jul 2 07:53:56.988070 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 07:53:56.988078 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:53:56.988086 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:53:56.988093 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 07:53:56.988101 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:53:56.988109 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:53:56.988119 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:53:56.988127 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:53:56.988135 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:53:56.988142 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:53:56.988150 kernel: TSC deadline timer available Jul 2 07:53:56.988162 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:53:56.988170 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Jul 2 07:53:56.988192 kernel: Booting paravirtualized kernel on KVM Jul 2 07:53:56.988200 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:53:56.988211 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:53:56.988218 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:53:56.988226 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:53:56.988234 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:53:56.988241 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Jul 2 07:53:56.988249 kernel: kvm-guest: PV spinlocks disabled, no host support Jul 2 07:53:56.988257 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Jul 2 07:53:56.988265 kernel: Policy zone: DMA32 Jul 2 07:53:56.988273 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:56.988284 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:53:56.988292 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:53:56.988300 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:53:56.988329 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:53:56.988337 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123076K reserved, 0K cma-reserved) Jul 2 07:53:56.988345 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:53:56.988353 kernel: Kernel/User page tables isolation: enabled Jul 2 07:53:56.988361 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:53:56.988372 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:53:56.988379 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:53:56.988388 kernel: rcu: RCU event tracing is enabled. Jul 2 07:53:56.988396 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:53:56.988404 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:53:56.988412 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:53:56.988420 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:53:56.988428 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:53:56.988435 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:53:56.988445 kernel: random: crng init done Jul 2 07:53:56.988453 kernel: Console: colour VGA+ 80x25 Jul 2 07:53:56.988461 kernel: printk: console [tty0] enabled Jul 2 07:53:56.988469 kernel: printk: console [ttyS0] enabled Jul 2 07:53:56.988477 kernel: ACPI: Core revision 20210730 Jul 2 07:53:56.988485 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 2 07:53:56.988493 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:53:56.988501 kernel: x2apic enabled Jul 2 07:53:56.988509 kernel: Switched APIC routing to physical x2apic. Jul 2 07:53:56.988516 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 07:53:56.988526 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3985ba32100, max_idle_ns: 881590654722 ns Jul 2 07:53:56.988535 kernel: Calibrating delay loop (skipped) preset value.. 3990.61 BogoMIPS (lpj=1995307) Jul 2 07:53:56.988547 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 2 07:53:56.988555 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 2 07:53:56.988563 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:53:56.988572 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:53:56.988583 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:53:56.988591 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:53:56.988603 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Jul 2 07:53:56.988619 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:53:56.988628 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:53:56.988677 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:53:56.988691 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:56.988700 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:53:56.988708 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:53:56.988717 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:53:56.988725 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:53:56.988734 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:53:56.988745 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:53:56.988753 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:53:56.988762 kernel: LSM: Security Framework initializing Jul 2 07:53:56.988770 kernel: SELinux: Initializing. Jul 2 07:53:56.988778 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:53:56.988786 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:53:56.988795 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Jul 2 07:53:56.988806 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Jul 2 07:53:56.988814 kernel: signal: max sigframe size: 1776 Jul 2 07:53:56.988822 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:53:56.988831 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:53:56.988839 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:53:56.988847 kernel: x86: Booting SMP configuration: Jul 2 07:53:56.988856 kernel: .... node #0, CPUs: #1 Jul 2 07:53:56.988864 kernel: kvm-clock: cpu 1, msr 13192041, secondary cpu clock Jul 2 07:53:56.988872 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Jul 2 07:53:56.988882 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:53:56.988890 kernel: smpboot: Max logical packages: 1 Jul 2 07:53:56.988899 kernel: smpboot: Total of 2 processors activated (7981.22 BogoMIPS) Jul 2 07:53:56.988907 kernel: devtmpfs: initialized Jul 2 07:53:56.988915 kernel: x86/mm: Memory block size: 128MB Jul 2 07:53:56.988923 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:53:56.988932 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:53:56.988940 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:53:56.988948 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:53:56.988959 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:53:56.988967 kernel: audit: type=2000 audit(1719906836.445:1): state=initialized audit_enabled=0 res=1 Jul 2 07:53:56.988975 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:53:56.988983 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:53:56.988991 kernel: cpuidle: using governor menu Jul 2 07:53:56.988999 kernel: ACPI: bus type PCI registered Jul 2 07:53:56.989008 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:53:56.989016 kernel: dca service started, version 1.12.1 Jul 2 07:53:56.989024 kernel: PCI: Using configuration type 1 for base access Jul 2 07:53:56.989035 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:53:56.989047 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:53:56.989056 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:53:56.989064 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:53:56.989072 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:53:56.989080 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:53:56.989088 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:53:56.989096 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:53:56.989105 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:53:56.989116 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:53:56.989124 kernel: ACPI: Interpreter enabled Jul 2 07:53:56.989132 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:53:56.989140 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:53:56.989149 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:53:56.989157 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 07:53:56.989165 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:53:56.992508 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:53:56.992640 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:53:56.992654 kernel: acpiphp: Slot [3] registered Jul 2 07:53:56.992663 kernel: acpiphp: Slot [4] registered Jul 2 07:53:56.992672 kernel: acpiphp: Slot [5] registered Jul 2 07:53:56.992680 kernel: acpiphp: Slot [6] registered Jul 2 07:53:56.992689 kernel: acpiphp: Slot [7] registered Jul 2 07:53:56.992697 kernel: acpiphp: Slot [8] registered Jul 2 07:53:56.992706 kernel: acpiphp: Slot [9] registered Jul 2 07:53:56.992714 kernel: acpiphp: Slot [10] registered Jul 2 07:53:56.992726 kernel: acpiphp: Slot [11] registered Jul 2 07:53:56.992734 kernel: acpiphp: Slot [12] registered Jul 2 07:53:56.992743 kernel: acpiphp: Slot [13] registered Jul 2 07:53:56.992751 kernel: acpiphp: Slot [14] registered Jul 2 07:53:56.992760 kernel: acpiphp: Slot [15] registered Jul 2 07:53:56.992768 kernel: acpiphp: Slot [16] registered Jul 2 07:53:56.992776 kernel: acpiphp: Slot [17] registered Jul 2 07:53:56.992785 kernel: acpiphp: Slot [18] registered Jul 2 07:53:56.992793 kernel: acpiphp: Slot [19] registered Jul 2 07:53:56.992804 kernel: acpiphp: Slot [20] registered Jul 2 07:53:56.992813 kernel: acpiphp: Slot [21] registered Jul 2 07:53:56.992821 kernel: acpiphp: Slot [22] registered Jul 2 07:53:56.992830 kernel: acpiphp: Slot [23] registered Jul 2 07:53:56.992838 kernel: acpiphp: Slot [24] registered Jul 2 07:53:56.992846 kernel: acpiphp: Slot [25] registered Jul 2 07:53:56.992855 kernel: acpiphp: Slot [26] registered Jul 2 07:53:56.992863 kernel: acpiphp: Slot [27] registered Jul 2 07:53:56.992872 kernel: acpiphp: Slot [28] registered Jul 2 07:53:56.992880 kernel: acpiphp: Slot [29] registered Jul 2 07:53:56.992891 kernel: acpiphp: Slot [30] registered Jul 2 07:53:56.992899 kernel: acpiphp: Slot [31] registered Jul 2 07:53:56.992907 kernel: PCI host bridge to bus 0000:00 Jul 2 07:53:56.993009 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:53:56.993091 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:53:56.993172 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:53:56.995308 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 07:53:56.995396 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jul 2 07:53:56.995478 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:53:56.995634 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:53:56.995751 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:53:56.995861 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 07:53:56.995972 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Jul 2 07:53:56.996068 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 07:53:56.996170 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 07:53:56.996312 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 07:53:56.996400 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 07:53:56.996507 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Jul 2 07:53:56.996633 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Jul 2 07:53:56.996733 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:53:56.996836 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jul 2 07:53:56.996932 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jul 2 07:53:56.997112 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jul 2 07:53:56.997253 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jul 2 07:53:56.997403 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jul 2 07:53:56.997549 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Jul 2 07:53:56.997685 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Jul 2 07:53:56.997822 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:53:56.997981 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:53:56.998112 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Jul 2 07:53:56.998273 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Jul 2 07:53:56.998403 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jul 2 07:53:56.998557 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:53:56.998693 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Jul 2 07:53:56.998823 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Jul 2 07:53:56.998953 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jul 2 07:53:56.999105 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Jul 2 07:53:56.999248 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Jul 2 07:53:56.999378 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Jul 2 07:53:56.999503 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jul 2 07:53:56.999655 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:53:56.999783 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 07:53:56.999926 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Jul 2 07:53:57.000059 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jul 2 07:53:57.004278 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:53:57.004394 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Jul 2 07:53:57.004517 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Jul 2 07:53:57.004659 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Jul 2 07:53:57.004800 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Jul 2 07:53:57.004894 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Jul 2 07:53:57.004986 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Jul 2 07:53:57.004997 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:53:57.005006 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:53:57.005015 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:53:57.005028 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:53:57.005037 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:53:57.005045 kernel: iommu: Default domain type: Translated Jul 2 07:53:57.005054 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:53:57.005145 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 07:53:57.007354 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:53:57.007470 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 07:53:57.007482 kernel: vgaarb: loaded Jul 2 07:53:57.007493 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:53:57.007510 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:53:57.007520 kernel: PTP clock support registered Jul 2 07:53:57.007530 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:53:57.007540 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:53:57.007549 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 07:53:57.007559 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Jul 2 07:53:57.007568 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 2 07:53:57.007576 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 2 07:53:57.007587 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:53:57.007596 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:53:57.007605 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:53:57.007614 kernel: pnp: PnP ACPI init Jul 2 07:53:57.007623 kernel: pnp: PnP ACPI: found 4 devices Jul 2 07:53:57.007632 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:53:57.007641 kernel: NET: Registered PF_INET protocol family Jul 2 07:53:57.007649 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:53:57.007658 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 07:53:57.007669 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:53:57.007678 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:57.007686 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 07:53:57.007695 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 07:53:57.007703 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:53:57.007712 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:53:57.007720 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:53:57.007729 kernel: NET: Registered PF_XDP protocol family Jul 2 07:53:57.007821 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:53:57.007907 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:53:57.008007 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:53:57.008116 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 07:53:57.008308 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jul 2 07:53:57.008403 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 07:53:57.008496 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:53:57.008585 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:53:57.008597 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 07:53:57.008690 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 34571 usecs Jul 2 07:53:57.008701 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:53:57.008710 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:53:57.008719 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x3985ba32100, max_idle_ns: 881590654722 ns Jul 2 07:53:57.008727 kernel: Initialise system trusted keyrings Jul 2 07:53:57.008736 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 07:53:57.008745 kernel: Key type asymmetric registered Jul 2 07:53:57.008753 kernel: Asymmetric key parser 'x509' registered Jul 2 07:53:57.008761 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:53:57.008773 kernel: io scheduler mq-deadline registered Jul 2 07:53:57.008782 kernel: io scheduler kyber registered Jul 2 07:53:57.008790 kernel: io scheduler bfq registered Jul 2 07:53:57.008799 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:53:57.008808 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jul 2 07:53:57.008817 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:53:57.008825 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:53:57.008834 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:53:57.008842 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:53:57.008853 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:53:57.008862 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:53:57.008871 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:53:57.008880 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:53:57.009021 kernel: rtc_cmos 00:03: RTC can wake from S4 Jul 2 07:53:57.009107 kernel: rtc_cmos 00:03: registered as rtc0 Jul 2 07:53:57.010244 kernel: rtc_cmos 00:03: setting system clock to 2024-07-02T07:53:56 UTC (1719906836) Jul 2 07:53:57.010387 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jul 2 07:53:57.010399 kernel: intel_pstate: CPU model not supported Jul 2 07:53:57.010408 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:53:57.010417 kernel: Segment Routing with IPv6 Jul 2 07:53:57.010426 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:53:57.010434 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:53:57.010443 kernel: Key type dns_resolver registered Jul 2 07:53:57.010452 kernel: IPI shorthand broadcast: enabled Jul 2 07:53:57.010461 kernel: sched_clock: Marking stable (709604389, 126614136)->(975391190, -139172665) Jul 2 07:53:57.010470 kernel: registered taskstats version 1 Jul 2 07:53:57.010482 kernel: Loading compiled-in X.509 certificates Jul 2 07:53:57.010491 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:53:57.010500 kernel: Key type .fscrypt registered Jul 2 07:53:57.010509 kernel: Key type fscrypt-provisioning registered Jul 2 07:53:57.010518 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:53:57.010527 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:53:57.010535 kernel: ima: No architecture policies found Jul 2 07:53:57.010544 kernel: clk: Disabling unused clocks Jul 2 07:53:57.010555 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:53:57.010564 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:53:57.010573 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:53:57.010581 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:53:57.010589 kernel: Run /init as init process Jul 2 07:53:57.010598 kernel: with arguments: Jul 2 07:53:57.010627 kernel: /init Jul 2 07:53:57.010639 kernel: with environment: Jul 2 07:53:57.010648 kernel: HOME=/ Jul 2 07:53:57.010659 kernel: TERM=linux Jul 2 07:53:57.010668 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:53:57.010683 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:57.010696 systemd[1]: Detected virtualization kvm. Jul 2 07:53:57.010706 systemd[1]: Detected architecture x86-64. Jul 2 07:53:57.010715 systemd[1]: Running in initrd. Jul 2 07:53:57.010724 systemd[1]: No hostname configured, using default hostname. Jul 2 07:53:57.010733 systemd[1]: Hostname set to . Jul 2 07:53:57.010745 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:53:57.010754 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:53:57.010763 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:57.010773 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:57.010783 systemd[1]: Reached target paths.target. Jul 2 07:53:57.010792 systemd[1]: Reached target slices.target. Jul 2 07:53:57.010801 systemd[1]: Reached target swap.target. Jul 2 07:53:57.010810 systemd[1]: Reached target timers.target. Jul 2 07:53:57.010825 systemd[1]: Listening on iscsid.socket. Jul 2 07:53:57.010834 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:53:57.010844 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:53:57.010853 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:53:57.010862 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:53:57.010872 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:57.010881 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:57.010891 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:57.010903 systemd[1]: Reached target sockets.target. Jul 2 07:53:57.010913 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:57.010924 systemd[1]: Finished network-cleanup.service. Jul 2 07:53:57.010934 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:53:57.010943 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:57.010955 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:57.010965 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:57.010975 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:53:57.010984 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:57.011002 systemd-journald[185]: Journal started Jul 2 07:53:57.011068 systemd-journald[185]: Runtime Journal (/run/log/journal/037371e71b0140a99cecaef6fa0977d5) is 4.9M, max 39.5M, 34.5M free. Jul 2 07:53:56.964021 systemd-modules-load[186]: Inserted module 'overlay' Jul 2 07:53:57.040135 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:53:57.040168 kernel: Bridge firewalling registered Jul 2 07:53:57.040201 systemd[1]: Started systemd-journald.service. Jul 2 07:53:57.040219 kernel: audit: type=1130 audit(1719906837.034:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.008947 systemd-resolved[187]: Positive Trust Anchors: Jul 2 07:53:57.051747 kernel: audit: type=1130 audit(1719906837.040:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.051781 kernel: audit: type=1130 audit(1719906837.046:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.056302 kernel: audit: type=1130 audit(1719906837.050:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.056338 kernel: SCSI subsystem initialized Jul 2 07:53:57.008959 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:57.008991 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:57.018470 systemd-resolved[187]: Defaulting to hostname 'linux'. Jul 2 07:53:57.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.026219 systemd-modules-load[186]: Inserted module 'br_netfilter' Jul 2 07:53:57.076326 kernel: audit: type=1130 audit(1719906837.067:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.040818 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:57.083852 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:53:57.083883 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:53:57.047058 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:53:57.051241 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:57.057432 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:57.064389 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:53:57.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.078419 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:53:57.092778 kernel: audit: type=1130 audit(1719906837.086:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.092809 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:53:57.086304 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:57.096632 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:53:57.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.102425 kernel: audit: type=1130 audit(1719906837.096:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.101818 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:53:57.103654 systemd-modules-load[186]: Inserted module 'dm_multipath' Jul 2 07:53:57.105202 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:57.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.115686 dracut-cmdline[203]: dracut-dracut-053 Jul 2 07:53:57.116450 kernel: audit: type=1130 audit(1719906837.112:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.116481 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:57.119875 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:57.128024 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:57.132578 kernel: audit: type=1130 audit(1719906837.128:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.199225 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:53:57.221216 kernel: iscsi: registered transport (tcp) Jul 2 07:53:57.250219 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:53:57.250307 kernel: QLogic iSCSI HBA Driver Jul 2 07:53:57.289897 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:53:57.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.291674 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:53:57.348275 kernel: raid6: avx2x4 gen() 29320 MB/s Jul 2 07:53:57.365269 kernel: raid6: avx2x4 xor() 10312 MB/s Jul 2 07:53:57.382233 kernel: raid6: avx2x2 gen() 30467 MB/s Jul 2 07:53:57.399255 kernel: raid6: avx2x2 xor() 16797 MB/s Jul 2 07:53:57.416252 kernel: raid6: avx2x1 gen() 22680 MB/s Jul 2 07:53:57.433313 kernel: raid6: avx2x1 xor() 12880 MB/s Jul 2 07:53:57.451250 kernel: raid6: sse2x4 gen() 10653 MB/s Jul 2 07:53:57.468286 kernel: raid6: sse2x4 xor() 5481 MB/s Jul 2 07:53:57.486258 kernel: raid6: sse2x2 gen() 10437 MB/s Jul 2 07:53:57.503257 kernel: raid6: sse2x2 xor() 6109 MB/s Jul 2 07:53:57.520257 kernel: raid6: sse2x1 gen() 7791 MB/s Jul 2 07:53:57.538073 kernel: raid6: sse2x1 xor() 4988 MB/s Jul 2 07:53:57.538168 kernel: raid6: using algorithm avx2x2 gen() 30467 MB/s Jul 2 07:53:57.538207 kernel: raid6: .... xor() 16797 MB/s, rmw enabled Jul 2 07:53:57.538967 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:53:57.556246 kernel: xor: automatically using best checksumming function avx Jul 2 07:53:57.689239 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:53:57.702388 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:53:57.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.703000 audit: BPF prog-id=7 op=LOAD Jul 2 07:53:57.703000 audit: BPF prog-id=8 op=LOAD Jul 2 07:53:57.704584 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:57.720734 systemd-udevd[386]: Using default interface naming scheme 'v252'. Jul 2 07:53:57.725726 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:57.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.732120 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:53:57.749645 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Jul 2 07:53:57.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.792122 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:53:57.793941 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:57.844892 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:57.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.903213 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jul 2 07:53:57.911992 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:53:57.920233 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:53:57.920307 kernel: GPT:9289727 != 125829119 Jul 2 07:53:57.920323 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:53:57.921300 kernel: GPT:9289727 != 125829119 Jul 2 07:53:57.922912 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:53:57.922949 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:53:57.948216 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:53:57.971211 kernel: virtio_blk virtio5: [vdb] 968 512-byte logical blocks (496 kB/484 KiB) Jul 2 07:53:57.995421 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:53:57.995495 kernel: AES CTR mode by8 optimization enabled Jul 2 07:53:58.014215 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (436) Jul 2 07:53:58.018409 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:53:58.021985 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:53:58.029881 kernel: libata version 3.00 loaded. Jul 2 07:53:58.051081 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:53:58.126441 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 07:53:58.126733 kernel: ACPI: bus type USB registered Jul 2 07:53:58.126765 kernel: usbcore: registered new interface driver usbfs Jul 2 07:53:58.126784 kernel: usbcore: registered new interface driver hub Jul 2 07:53:58.126802 kernel: usbcore: registered new device driver usb Jul 2 07:53:58.126817 kernel: scsi host1: ata_piix Jul 2 07:53:58.127011 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Jul 2 07:53:58.127033 kernel: ehci-pci: EHCI PCI platform driver Jul 2 07:53:58.127052 kernel: scsi host2: ata_piix Jul 2 07:53:58.127255 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Jul 2 07:53:58.127281 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Jul 2 07:53:58.127299 kernel: uhci_hcd: USB Universal Host Controller Interface driver Jul 2 07:53:58.127318 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jul 2 07:53:58.127494 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jul 2 07:53:58.127650 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jul 2 07:53:58.127807 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Jul 2 07:53:58.127979 kernel: hub 1-0:1.0: USB hub found Jul 2 07:53:58.128233 kernel: hub 1-0:1.0: 2 ports detected Jul 2 07:53:58.125477 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:53:58.130906 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:58.133550 systemd[1]: Starting disk-uuid.service... Jul 2 07:53:58.140095 disk-uuid[506]: Primary Header is updated. Jul 2 07:53:58.140095 disk-uuid[506]: Secondary Entries is updated. Jul 2 07:53:58.140095 disk-uuid[506]: Secondary Header is updated. Jul 2 07:53:58.143219 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:53:59.165234 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:53:59.166155 disk-uuid[508]: The operation has completed successfully. Jul 2 07:53:59.227062 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:53:59.228265 systemd[1]: Finished disk-uuid.service. Jul 2 07:53:59.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.239849 systemd[1]: Starting verity-setup.service... Jul 2 07:53:59.267427 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:53:59.326539 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:53:59.329998 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:53:59.333367 systemd[1]: Finished verity-setup.service. Jul 2 07:53:59.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.458225 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:59.459251 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:53:59.460992 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:53:59.463464 systemd[1]: Starting ignition-setup.service... Jul 2 07:53:59.466291 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:53:59.482251 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:59.482352 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:53:59.482372 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:53:59.504693 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:53:59.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.513866 systemd[1]: Finished ignition-setup.service. Jul 2 07:53:59.515711 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:53:59.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.693000 audit: BPF prog-id=9 op=LOAD Jul 2 07:53:59.691318 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:53:59.695449 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:59.721664 ignition[605]: Ignition 2.14.0 Jul 2 07:53:59.721679 ignition[605]: Stage: fetch-offline Jul 2 07:53:59.721758 ignition[605]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:59.721791 ignition[605]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:53:59.730454 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:53:59.730650 ignition[605]: parsed url from cmdline: "" Jul 2 07:53:59.730658 ignition[605]: no config URL provided Jul 2 07:53:59.730668 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:59.730683 ignition[605]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:59.730700 ignition[605]: failed to fetch config: resource requires networking Jul 2 07:53:59.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.735585 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:53:59.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.730898 ignition[605]: Ignition finished successfully Jul 2 07:53:59.736205 systemd-networkd[692]: lo: Link UP Jul 2 07:53:59.736211 systemd-networkd[692]: lo: Gained carrier Jul 2 07:53:59.737647 systemd-networkd[692]: Enumeration completed Jul 2 07:53:59.737871 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:59.738612 systemd-networkd[692]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:59.738820 systemd[1]: Reached target network.target. Jul 2 07:53:59.740415 systemd-networkd[692]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Jul 2 07:53:59.741515 systemd[1]: Starting ignition-fetch.service... Jul 2 07:53:59.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.743237 systemd-networkd[692]: eth1: Link UP Jul 2 07:53:59.767849 ignition[694]: Ignition 2.14.0 Jul 2 07:53:59.743243 systemd-networkd[692]: eth1: Gained carrier Jul 2 07:53:59.767860 ignition[694]: Stage: fetch Jul 2 07:53:59.745820 systemd[1]: Starting iscsiuio.service... Jul 2 07:53:59.768158 ignition[694]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:59.754113 systemd-networkd[692]: eth0: Link UP Jul 2 07:53:59.768199 ignition[694]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:53:59.754118 systemd-networkd[692]: eth0: Gained carrier Jul 2 07:53:59.772123 ignition[694]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:53:59.791647 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:59.791647 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:53:59.791647 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:53:59.791647 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:53:59.791647 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:59.791647 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:53:59.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.776823 systemd-networkd[692]: eth0: DHCPv4 address 137.184.188.4/20, gateway 137.184.176.1 acquired from 169.254.169.253 Jul 2 07:53:59.772401 ignition[694]: parsed url from cmdline: "" Jul 2 07:53:59.777500 systemd[1]: Started iscsiuio.service. Jul 2 07:53:59.772408 ignition[694]: no config URL provided Jul 2 07:53:59.780074 systemd[1]: Starting iscsid.service... Jul 2 07:53:59.772417 ignition[694]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:59.787430 systemd-networkd[692]: eth1: DHCPv4 address 10.124.0.15/20 acquired from 169.254.169.253 Jul 2 07:53:59.772433 ignition[694]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:59.795407 systemd[1]: Started iscsid.service. Jul 2 07:53:59.772487 ignition[694]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Jul 2 07:53:59.798711 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:53:59.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.818409 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:53:59.819341 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:53:59.820082 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:59.820743 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:59.822991 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:53:59.828375 ignition[694]: GET result: OK Jul 2 07:53:59.828619 ignition[694]: parsing config with SHA512: 104385dcd7d4292a326de0943c4e5504dc7e79b76027a604b85b1e9f1df19f0c14e35b67e697b769239c6e4f80c183c117f27fe89eece7971d518eaa35406662 Jul 2 07:53:59.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.838296 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:53:59.840822 unknown[694]: fetched base config from "system" Jul 2 07:53:59.840838 unknown[694]: fetched base config from "system" Jul 2 07:53:59.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.841307 ignition[694]: fetch: fetch complete Jul 2 07:53:59.840845 unknown[694]: fetched user config from "digitalocean" Jul 2 07:53:59.841313 ignition[694]: fetch: fetch passed Jul 2 07:53:59.843038 systemd[1]: Finished ignition-fetch.service. Jul 2 07:53:59.841356 ignition[694]: Ignition finished successfully Jul 2 07:53:59.845464 systemd[1]: Starting ignition-kargs.service... Jul 2 07:53:59.865690 ignition[717]: Ignition 2.14.0 Jul 2 07:53:59.865705 ignition[717]: Stage: kargs Jul 2 07:53:59.865876 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:59.865905 ignition[717]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:53:59.868483 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:53:59.870313 ignition[717]: kargs: kargs passed Jul 2 07:53:59.870401 ignition[717]: Ignition finished successfully Jul 2 07:53:59.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.872745 systemd[1]: Finished ignition-kargs.service. Jul 2 07:53:59.874677 systemd[1]: Starting ignition-disks.service... Jul 2 07:53:59.885978 ignition[723]: Ignition 2.14.0 Jul 2 07:53:59.885995 ignition[723]: Stage: disks Jul 2 07:53:59.886204 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:59.886227 ignition[723]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:53:59.888673 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:53:59.890313 ignition[723]: disks: disks passed Jul 2 07:53:59.890407 ignition[723]: Ignition finished successfully Jul 2 07:53:59.892171 systemd[1]: Finished ignition-disks.service. Jul 2 07:53:59.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.893158 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:53:59.894378 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:59.895433 systemd[1]: Reached target local-fs.target. Jul 2 07:53:59.896635 systemd[1]: Reached target sysinit.target. Jul 2 07:53:59.897801 systemd[1]: Reached target basic.target. Jul 2 07:53:59.900775 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:53:59.922206 systemd-fsck[731]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:53:59.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.926656 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:53:59.929153 systemd[1]: Mounting sysroot.mount... Jul 2 07:53:59.946204 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:59.947171 systemd[1]: Mounted sysroot.mount. Jul 2 07:53:59.948610 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:53:59.951903 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:53:59.953662 systemd[1]: Starting flatcar-digitalocean-network.service... Jul 2 07:53:59.955868 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 07:53:59.956649 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:53:59.956694 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:53:59.966526 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:53:59.976551 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:53:59.988415 initrd-setup-root[743]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:54:00.001643 initrd-setup-root[751]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:54:00.017637 initrd-setup-root[761]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:54:00.034279 initrd-setup-root[771]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:54:00.109538 coreos-metadata[738]: Jul 02 07:54:00.109 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:54:00.122256 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:54:00.124343 coreos-metadata[738]: Jul 02 07:54:00.123 INFO Fetch successful Jul 2 07:54:00.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.124555 systemd[1]: Starting ignition-mount.service... Jul 2 07:54:00.130511 systemd[1]: Starting sysroot-boot.service... Jul 2 07:54:00.138342 coreos-metadata[738]: Jul 02 07:54:00.138 INFO wrote hostname ci-3510.3.5-a-4df693d906 to /sysroot/etc/hostname Jul 2 07:54:00.139604 coreos-metadata[737]: Jul 02 07:54:00.138 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:54:00.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.139493 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 07:54:00.146813 bash[789]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 07:54:00.157903 coreos-metadata[737]: Jul 02 07:54:00.157 INFO Fetch successful Jul 2 07:54:00.162023 ignition[790]: INFO : Ignition 2.14.0 Jul 2 07:54:00.162023 ignition[790]: INFO : Stage: mount Jul 2 07:54:00.163847 ignition[790]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:54:00.163847 ignition[790]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:54:00.166563 ignition[790]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:54:00.166563 ignition[790]: INFO : mount: mount passed Jul 2 07:54:00.166563 ignition[790]: INFO : Ignition finished successfully Jul 2 07:54:00.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.167486 systemd[1]: Finished ignition-mount.service. Jul 2 07:54:00.178851 systemd[1]: Finished sysroot-boot.service. Jul 2 07:54:00.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.181524 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Jul 2 07:54:00.181662 systemd[1]: Finished flatcar-digitalocean-network.service. Jul 2 07:54:00.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.354853 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:54:00.363256 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (797) Jul 2 07:54:00.367058 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:54:00.367157 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:54:00.367201 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:54:00.374381 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:54:00.385711 systemd[1]: Starting ignition-files.service... Jul 2 07:54:00.411111 ignition[817]: INFO : Ignition 2.14.0 Jul 2 07:54:00.411111 ignition[817]: INFO : Stage: files Jul 2 07:54:00.412788 ignition[817]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:54:00.412788 ignition[817]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:54:00.414609 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:54:00.418017 ignition[817]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:54:00.419776 ignition[817]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:54:00.419776 ignition[817]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:54:00.422785 ignition[817]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:54:00.423988 ignition[817]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:54:00.425099 ignition[817]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:54:00.425099 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:54:00.425099 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:54:00.424035 unknown[817]: wrote ssh authorized keys file for user: core Jul 2 07:54:01.290030 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 07:54:01.363821 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:54:01.363821 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:54:01.366981 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 07:54:01.503825 systemd-networkd[692]: eth0: Gained IPv6LL Jul 2 07:54:01.631790 systemd-networkd[692]: eth1: Gained IPv6LL Jul 2 07:54:01.807812 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 2 07:54:02.244448 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:54:02.246266 ignition[817]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:54:02.247636 ignition[817]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:54:02.248848 ignition[817]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Jul 2 07:54:02.250468 ignition[817]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:54:02.251870 ignition[817]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:54:02.259773 ignition[817]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:54:02.261102 ignition[817]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:54:02.261102 ignition[817]: INFO : files: files passed Jul 2 07:54:02.261102 ignition[817]: INFO : Ignition finished successfully Jul 2 07:54:02.273028 kernel: kauditd_printk_skb: 29 callbacks suppressed Jul 2 07:54:02.273082 kernel: audit: type=1130 audit(1719906842.263:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.262815 systemd[1]: Finished ignition-files.service. Jul 2 07:54:02.264921 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:54:02.271318 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:54:02.278081 initrd-setup-root-after-ignition[841]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:54:02.278672 systemd[1]: Starting ignition-quench.service... Jul 2 07:54:02.280833 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:54:02.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.282790 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:54:02.298506 kernel: audit: type=1130 audit(1719906842.282:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.298574 kernel: audit: type=1130 audit(1719906842.287:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.298595 kernel: audit: type=1131 audit(1719906842.287:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.282956 systemd[1]: Finished ignition-quench.service. Jul 2 07:54:02.287841 systemd[1]: Reached target ignition-complete.target. Jul 2 07:54:02.300163 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:54:02.324536 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:54:02.324688 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:54:02.336225 kernel: audit: type=1130 audit(1719906842.326:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.336293 kernel: audit: type=1131 audit(1719906842.326:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.326538 systemd[1]: Reached target initrd-fs.target. Jul 2 07:54:02.336803 systemd[1]: Reached target initrd.target. Jul 2 07:54:02.338053 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:54:02.339500 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:54:02.362231 kernel: audit: type=1130 audit(1719906842.357:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.357413 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:54:02.359626 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:54:02.373737 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:54:02.375419 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:54:02.376909 systemd[1]: Stopped target timers.target. Jul 2 07:54:02.378107 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:54:02.379060 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:54:02.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.384628 systemd[1]: Stopped target initrd.target. Jul 2 07:54:02.386084 kernel: audit: type=1131 audit(1719906842.380:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.385553 systemd[1]: Stopped target basic.target. Jul 2 07:54:02.386762 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:54:02.387882 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:54:02.395848 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:54:02.396863 systemd[1]: Stopped target remote-fs.target. Jul 2 07:54:02.397962 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:54:02.399160 systemd[1]: Stopped target sysinit.target. Jul 2 07:54:02.400360 systemd[1]: Stopped target local-fs.target. Jul 2 07:54:02.401510 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:54:02.402614 systemd[1]: Stopped target swap.target. Jul 2 07:54:02.403648 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:54:02.403963 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:54:02.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.405799 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:54:02.410963 kernel: audit: type=1131 audit(1719906842.405:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.411568 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:54:02.411750 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:54:02.418732 kernel: audit: type=1131 audit(1719906842.413:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.413484 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:54:02.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.413682 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:54:02.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.419689 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:54:02.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.419858 systemd[1]: Stopped ignition-files.service. Jul 2 07:54:02.421135 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:54:02.421409 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 07:54:02.426288 iscsid[702]: iscsid shutting down. Jul 2 07:54:02.423802 systemd[1]: Stopping ignition-mount.service... Jul 2 07:54:02.430118 systemd[1]: Stopping iscsid.service... Jul 2 07:54:02.430721 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:54:02.430922 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:54:02.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.446043 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:54:02.453915 ignition[855]: INFO : Ignition 2.14.0 Jul 2 07:54:02.453915 ignition[855]: INFO : Stage: umount Jul 2 07:54:02.453915 ignition[855]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:54:02.453915 ignition[855]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:54:02.446832 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:54:02.447105 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:54:02.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.448018 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:54:02.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.476281 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:54:02.476281 ignition[855]: INFO : umount: umount passed Jul 2 07:54:02.476281 ignition[855]: INFO : Ignition finished successfully Jul 2 07:54:02.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.448240 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:54:02.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.453472 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:54:02.453634 systemd[1]: Stopped iscsid.service. Jul 2 07:54:02.465473 systemd[1]: Stopping iscsiuio.service... Jul 2 07:54:02.466534 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:54:02.466682 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:54:02.470987 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:54:02.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.471133 systemd[1]: Stopped iscsiuio.service. Jul 2 07:54:02.472313 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:54:02.472600 systemd[1]: Stopped ignition-mount.service. Jul 2 07:54:02.478254 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:54:02.478748 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:54:02.478819 systemd[1]: Stopped ignition-disks.service. Jul 2 07:54:02.481593 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:54:02.481695 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:54:02.482522 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:54:02.482571 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:54:02.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.496095 systemd[1]: Stopped target network.target. Jul 2 07:54:02.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.498550 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:54:02.546000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:54:02.498742 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:54:02.499628 systemd[1]: Stopped target paths.target. Jul 2 07:54:02.504219 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:54:02.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.509333 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:54:02.510165 systemd[1]: Stopped target slices.target. Jul 2 07:54:02.510872 systemd[1]: Stopped target sockets.target. Jul 2 07:54:02.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.512160 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:54:02.512271 systemd[1]: Closed iscsid.socket. Jul 2 07:54:02.515368 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:54:02.515456 systemd[1]: Closed iscsiuio.socket. Jul 2 07:54:02.516502 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:54:02.516580 systemd[1]: Stopped ignition-setup.service. Jul 2 07:54:02.522282 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:54:02.523792 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:54:02.530502 systemd-networkd[692]: eth0: DHCPv6 lease lost Jul 2 07:54:02.537373 systemd-networkd[692]: eth1: DHCPv6 lease lost Jul 2 07:54:02.539017 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:54:02.583000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:54:02.539196 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:54:02.543905 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:54:02.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.544172 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:54:02.545689 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:54:02.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.545738 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:54:02.551624 systemd[1]: Stopping network-cleanup.service... Jul 2 07:54:02.557326 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:54:02.557473 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:54:02.561455 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:54:02.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.561559 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:54:02.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.562794 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:54:02.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.562848 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:54:02.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.572591 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:54:02.575721 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:54:02.578949 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:54:02.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.579155 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:54:02.587449 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:54:02.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.587597 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:54:02.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:02.590297 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:54:02.590369 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:54:02.591347 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:54:02.591396 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:54:02.594417 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:54:02.594499 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:54:02.595548 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:54:02.595600 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:54:02.596701 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:54:02.596758 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:54:02.597983 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:54:02.598036 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:54:02.600528 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:54:02.601419 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:54:02.601495 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:54:02.610611 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:54:02.610783 systemd[1]: Stopped network-cleanup.service. Jul 2 07:54:02.612480 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:54:02.612607 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:54:02.613856 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:54:02.615793 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:54:02.633492 systemd[1]: Switching root. Jul 2 07:54:02.655430 systemd-journald[185]: Journal stopped Jul 2 07:54:06.707461 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Jul 2 07:54:06.707557 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:54:06.707584 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:54:06.707603 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:54:06.707620 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:54:06.707636 kernel: SELinux: policy capability open_perms=1 Jul 2 07:54:06.707649 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:54:06.707661 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:54:06.707673 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:54:06.707700 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:54:06.707715 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:54:06.707733 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:54:06.707745 systemd[1]: Successfully loaded SELinux policy in 62.003ms. Jul 2 07:54:06.707774 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.081ms. Jul 2 07:54:06.707788 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:54:06.707801 systemd[1]: Detected virtualization kvm. Jul 2 07:54:06.707814 systemd[1]: Detected architecture x86-64. Jul 2 07:54:06.707831 systemd[1]: Detected first boot. Jul 2 07:54:06.707844 systemd[1]: Hostname set to . Jul 2 07:54:06.707863 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:54:06.707876 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:54:06.707889 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:54:06.707903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:06.707921 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:06.707963 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:06.707985 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:54:06.708010 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:54:06.708030 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:54:06.708049 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:54:06.708061 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:54:06.708084 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:54:06.708097 systemd[1]: Created slice system-getty.slice. Jul 2 07:54:06.708109 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:54:06.708122 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:54:06.708135 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:54:06.708150 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:54:06.708162 systemd[1]: Created slice user.slice. Jul 2 07:54:06.708205 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:54:06.708219 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:54:06.708232 systemd[1]: Set up automount boot.automount. Jul 2 07:54:06.708244 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:54:06.708261 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:54:06.708273 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:54:06.708286 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:54:06.708298 systemd[1]: Reached target integritysetup.target. Jul 2 07:54:06.708311 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:54:06.708324 systemd[1]: Reached target remote-fs.target. Jul 2 07:54:06.708342 systemd[1]: Reached target slices.target. Jul 2 07:54:06.708354 systemd[1]: Reached target swap.target. Jul 2 07:54:06.708366 systemd[1]: Reached target torcx.target. Jul 2 07:54:06.708382 systemd[1]: Reached target veritysetup.target. Jul 2 07:54:06.708402 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:54:06.708415 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:54:06.708427 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:54:06.708439 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:54:06.708451 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:54:06.708464 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:54:06.708476 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:54:06.708489 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:54:06.708500 systemd[1]: Mounting media.mount... Jul 2 07:54:06.708515 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:06.708527 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:54:06.708539 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:54:06.708551 systemd[1]: Mounting tmp.mount... Jul 2 07:54:06.708563 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:54:06.708575 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:06.708588 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:54:06.708599 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:54:06.708612 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:06.708627 systemd[1]: Starting modprobe@drm.service... Jul 2 07:54:06.708639 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:06.708651 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:54:06.708671 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:06.708684 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:54:06.708696 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:54:06.708707 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:54:06.708724 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:54:06.708745 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:54:06.708759 systemd[1]: Stopped systemd-journald.service. Jul 2 07:54:06.708772 systemd[1]: Starting systemd-journald.service... Jul 2 07:54:06.708784 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:54:06.708797 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:54:06.708810 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:54:06.708822 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:54:06.708834 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:54:06.708847 systemd[1]: Stopped verity-setup.service. Jul 2 07:54:06.708859 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:06.708874 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:54:06.708887 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:54:06.708899 systemd[1]: Mounted media.mount. Jul 2 07:54:06.708911 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:54:06.708923 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:54:06.708936 systemd[1]: Mounted tmp.mount. Jul 2 07:54:06.708957 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:54:06.708970 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:54:06.708990 systemd-journald[963]: Journal started Jul 2 07:54:06.709061 systemd-journald[963]: Runtime Journal (/run/log/journal/037371e71b0140a99cecaef6fa0977d5) is 4.9M, max 39.5M, 34.5M free. Jul 2 07:54:02.819000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:54:02.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:54:02.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:54:02.883000 audit: BPF prog-id=10 op=LOAD Jul 2 07:54:02.883000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:54:02.883000 audit: BPF prog-id=11 op=LOAD Jul 2 07:54:02.883000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:54:03.007000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:54:03.007000 audit[887]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.007000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:54:03.009000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:54:03.009000 audit[887]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a9 a2=1ed a3=0 items=2 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.009000 audit: CWD cwd="/" Jul 2 07:54:03.009000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:03.009000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:03.009000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:54:06.479000 audit: BPF prog-id=12 op=LOAD Jul 2 07:54:06.479000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:54:06.479000 audit: BPF prog-id=13 op=LOAD Jul 2 07:54:06.479000 audit: BPF prog-id=14 op=LOAD Jul 2 07:54:06.479000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:54:06.479000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:54:06.480000 audit: BPF prog-id=15 op=LOAD Jul 2 07:54:06.480000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:54:06.480000 audit: BPF prog-id=16 op=LOAD Jul 2 07:54:06.480000 audit: BPF prog-id=17 op=LOAD Jul 2 07:54:06.480000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:54:06.480000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:54:06.481000 audit: BPF prog-id=18 op=LOAD Jul 2 07:54:06.481000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:54:06.481000 audit: BPF prog-id=19 op=LOAD Jul 2 07:54:06.481000 audit: BPF prog-id=20 op=LOAD Jul 2 07:54:06.481000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:54:06.481000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:54:06.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.490000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:54:06.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.713335 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:54:06.713392 systemd[1]: Started systemd-journald.service. Jul 2 07:54:06.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.641000 audit: BPF prog-id=21 op=LOAD Jul 2 07:54:06.642000 audit: BPF prog-id=22 op=LOAD Jul 2 07:54:06.642000 audit: BPF prog-id=23 op=LOAD Jul 2 07:54:06.642000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:54:06.642000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:54:06.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.700000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:54:06.700000 audit[963]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffeb5370140 a2=4000 a3=7ffeb53701dc items=0 ppid=1 pid=963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.700000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:54:06.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.003258 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:06.476756 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:54:03.003839 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:54:06.476775 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 07:54:03.003871 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:54:06.482088 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:54:03.004013 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:54:03.004034 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:54:03.004096 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:54:03.004120 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:54:03.004489 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:54:03.004555 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:54:03.004576 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:54:03.006289 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:54:03.006347 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:54:03.006372 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:54:03.006388 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:54:03.006408 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:54:03.006423 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:54:06.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.030076 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:54:06.030403 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:54:06.030522 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:54:06.030730 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:54:06.030786 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:54:06.030864 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-07-02T07:54:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:54:06.717091 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:06.718917 kernel: fuse: init (API version 7.34) Jul 2 07:54:06.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.717840 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:06.718742 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:54:06.718927 systemd[1]: Finished modprobe@drm.service. Jul 2 07:54:06.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.719803 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:06.720072 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:06.720872 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:54:06.721022 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:54:06.721821 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:54:06.722824 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:54:06.724510 systemd[1]: Reached target network-pre.target. Jul 2 07:54:06.730340 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:54:06.732502 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:54:06.736670 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:54:06.739128 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:54:06.742260 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:54:06.742895 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:06.745205 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:54:06.747646 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:54:06.751323 kernel: loop: module loaded Jul 2 07:54:06.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.749796 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:54:06.750446 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:54:06.752781 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:54:06.756763 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:06.756916 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:06.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.757800 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:06.769563 systemd-journald[963]: Time spent on flushing to /var/log/journal/037371e71b0140a99cecaef6fa0977d5 is 49.452ms for 1151 entries. Jul 2 07:54:06.769563 systemd-journald[963]: System Journal (/var/log/journal/037371e71b0140a99cecaef6fa0977d5) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:54:06.825526 systemd-journald[963]: Received client request to flush runtime journal. Jul 2 07:54:06.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.775816 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:54:06.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.777789 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:54:06.779844 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:54:06.781025 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:54:06.803360 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:54:06.813094 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:54:06.826644 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:54:06.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.843554 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:54:06.845771 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:54:06.857246 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:54:07.374479 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:54:07.378343 kernel: kauditd_printk_skb: 107 callbacks suppressed Jul 2 07:54:07.378501 kernel: audit: type=1130 audit(1719906847.374:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.377165 systemd[1]: Starting systemd-udevd.service... Jul 2 07:54:07.375000 audit: BPF prog-id=24 op=LOAD Jul 2 07:54:07.375000 audit: BPF prog-id=25 op=LOAD Jul 2 07:54:07.375000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:54:07.375000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:54:07.383214 kernel: audit: type=1334 audit(1719906847.375:149): prog-id=24 op=LOAD Jul 2 07:54:07.383268 kernel: audit: type=1334 audit(1719906847.375:150): prog-id=25 op=LOAD Jul 2 07:54:07.383286 kernel: audit: type=1334 audit(1719906847.375:151): prog-id=7 op=UNLOAD Jul 2 07:54:07.383302 kernel: audit: type=1334 audit(1719906847.375:152): prog-id=8 op=UNLOAD Jul 2 07:54:07.411133 systemd-udevd[997]: Using default interface naming scheme 'v252'. Jul 2 07:54:07.438538 systemd[1]: Started systemd-udevd.service. Jul 2 07:54:07.446087 kernel: audit: type=1130 audit(1719906847.439:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.446263 kernel: audit: type=1334 audit(1719906847.444:154): prog-id=26 op=LOAD Jul 2 07:54:07.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.444000 audit: BPF prog-id=26 op=LOAD Jul 2 07:54:07.445505 systemd[1]: Starting systemd-networkd.service... Jul 2 07:54:07.454000 audit: BPF prog-id=27 op=LOAD Jul 2 07:54:07.459616 kernel: audit: type=1334 audit(1719906847.454:155): prog-id=27 op=LOAD Jul 2 07:54:07.459664 kernel: audit: type=1334 audit(1719906847.455:156): prog-id=28 op=LOAD Jul 2 07:54:07.459692 kernel: audit: type=1334 audit(1719906847.457:157): prog-id=29 op=LOAD Jul 2 07:54:07.455000 audit: BPF prog-id=28 op=LOAD Jul 2 07:54:07.457000 audit: BPF prog-id=29 op=LOAD Jul 2 07:54:07.460502 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:54:07.507126 systemd[1]: Started systemd-userdbd.service. Jul 2 07:54:07.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.594513 systemd-networkd[999]: lo: Link UP Jul 2 07:54:07.594528 systemd-networkd[999]: lo: Gained carrier Jul 2 07:54:07.595003 systemd-networkd[999]: Enumeration completed Jul 2 07:54:07.595145 systemd[1]: Started systemd-networkd.service. Jul 2 07:54:07.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.605214 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:07.605374 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:07.609294 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:07.611608 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:07.613758 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:07.614299 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:54:07.614375 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:54:07.614465 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:07.614931 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:07.615070 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:07.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.616524 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:54:07.619582 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:07.619727 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:07.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.620387 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:07.621627 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:07.621764 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:07.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.622563 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:07.628634 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:54:07.667237 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:54:07.683244 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:54:07.719000 audit[998]: AVC avc: denied { confidentiality } for pid=998 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:54:07.719000 audit[998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55812d47df80 a1=3207c a2=7fe19abf9bc5 a3=5 items=108 ppid=997 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.719000 audit: CWD cwd="/" Jul 2 07:54:07.719000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=1 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=2 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=3 name=(null) inode=14844 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=4 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=5 name=(null) inode=14845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=6 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=7 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=8 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=9 name=(null) inode=14847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=10 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=11 name=(null) inode=14848 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=12 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=13 name=(null) inode=14849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=14 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=15 name=(null) inode=14850 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=16 name=(null) inode=14846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=17 name=(null) inode=14851 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=18 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=19 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=20 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=21 name=(null) inode=14853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=22 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=23 name=(null) inode=14854 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=24 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=25 name=(null) inode=14855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=26 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=27 name=(null) inode=14856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=28 name=(null) inode=14852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=29 name=(null) inode=14857 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=30 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=31 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=32 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=33 name=(null) inode=14859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=34 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=35 name=(null) inode=14860 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=36 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=37 name=(null) inode=14861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=38 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=39 name=(null) inode=14862 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=40 name=(null) inode=14858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=41 name=(null) inode=14863 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=42 name=(null) inode=14843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=43 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=44 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=45 name=(null) inode=14865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=46 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=47 name=(null) inode=14866 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=48 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=49 name=(null) inode=14867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=50 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=51 name=(null) inode=14868 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=52 name=(null) inode=14864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=53 name=(null) inode=14869 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=55 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=56 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=57 name=(null) inode=14871 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=58 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=59 name=(null) inode=14872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=60 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=61 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=62 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=63 name=(null) inode=14874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=64 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=65 name=(null) inode=14875 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=66 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=67 name=(null) inode=14876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=68 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=69 name=(null) inode=14877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=70 name=(null) inode=14873 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=71 name=(null) inode=14878 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=72 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=73 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=74 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=75 name=(null) inode=14880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=76 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=77 name=(null) inode=14881 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=78 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=79 name=(null) inode=14882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=80 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=81 name=(null) inode=14883 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=82 name=(null) inode=14879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=83 name=(null) inode=14884 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=84 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=85 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=86 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=87 name=(null) inode=14886 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=88 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=89 name=(null) inode=14887 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=90 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=91 name=(null) inode=14888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=92 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=93 name=(null) inode=14889 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=94 name=(null) inode=14885 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=95 name=(null) inode=14890 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=96 name=(null) inode=14870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=97 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=98 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=99 name=(null) inode=14892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=100 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=101 name=(null) inode=14893 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=102 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=103 name=(null) inode=14894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=104 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=105 name=(null) inode=14895 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=106 name=(null) inode=14891 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PATH item=107 name=(null) inode=14896 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:07.719000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:54:07.796236 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jul 2 07:54:07.798047 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 07:54:07.802074 systemd-networkd[999]: eth0: Configuring with /run/systemd/network/10-e2:1e:32:c0:da:b8.network. Jul 2 07:54:07.803455 systemd-networkd[999]: eth1: Configuring with /run/systemd/network/10-ee:03:e9:f6:5b:5f.network. Jul 2 07:54:07.803970 systemd-networkd[999]: eth0: Link UP Jul 2 07:54:07.803980 systemd-networkd[999]: eth0: Gained carrier Jul 2 07:54:07.807643 systemd-networkd[999]: eth1: Link UP Jul 2 07:54:07.807653 systemd-networkd[999]: eth1: Gained carrier Jul 2 07:54:07.810214 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:54:07.921253 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:54:07.943895 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:54:07.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.946721 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:54:07.967826 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:54:07.995874 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:54:07.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:07.996777 systemd[1]: Reached target cryptsetup.target. Jul 2 07:54:07.999621 systemd[1]: Starting lvm2-activation.service... Jul 2 07:54:08.006309 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:54:08.028839 systemd[1]: Finished lvm2-activation.service. Jul 2 07:54:08.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.029806 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:54:08.032916 systemd[1]: Mounting media-configdrive.mount... Jul 2 07:54:08.033694 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:54:08.033763 systemd[1]: Reached target machines.target. Jul 2 07:54:08.036411 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:54:08.053667 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:54:08.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.055208 kernel: ISO 9660 Extensions: RRIP_1991A Jul 2 07:54:08.056694 systemd[1]: Mounted media-configdrive.mount. Jul 2 07:54:08.057627 systemd[1]: Reached target local-fs.target. Jul 2 07:54:08.059812 systemd[1]: Starting ldconfig.service... Jul 2 07:54:08.061001 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.061089 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:08.064667 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:54:08.068948 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:54:08.074990 systemd[1]: Starting systemd-sysext.service... Jul 2 07:54:08.077367 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1042 (bootctl) Jul 2 07:54:08.079324 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:54:08.115032 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:54:08.136720 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:54:08.136949 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:54:08.152903 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:54:08.154686 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:54:08.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.169377 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 07:54:08.200214 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:54:08.225400 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 07:54:08.226703 systemd-fsck[1048]: fsck.fat 4.2 (2021-01-31) Jul 2 07:54:08.226703 systemd-fsck[1048]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 07:54:08.232544 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:54:08.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.235085 systemd[1]: Mounting boot.mount... Jul 2 07:54:08.249943 (sd-sysext)[1052]: Using extensions 'kubernetes'. Jul 2 07:54:08.253026 (sd-sysext)[1052]: Merged extensions into '/usr'. Jul 2 07:54:08.275227 systemd[1]: Mounted boot.mount. Jul 2 07:54:08.297462 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:08.301129 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:54:08.301982 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.305262 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:08.308992 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:08.314307 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:08.315647 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.316555 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:08.317356 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:08.321489 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:54:08.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.327762 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:54:08.329242 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:08.329477 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:08.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.332020 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:08.332298 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:08.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.334041 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:08.334324 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:08.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.335609 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:08.335736 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.337472 systemd[1]: Finished systemd-sysext.service. Jul 2 07:54:08.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.340725 systemd[1]: Starting ensure-sysext.service... Jul 2 07:54:08.342888 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:54:08.355214 systemd[1]: Reloading. Jul 2 07:54:08.390435 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:54:08.399549 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:54:08.411266 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:54:08.489519 ldconfig[1041]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:54:08.542764 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2024-07-02T07:54:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:08.542795 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2024-07-02T07:54:08Z" level=info msg="torcx already run" Jul 2 07:54:08.656074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:08.656104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:08.676774 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:08.757000 audit: BPF prog-id=30 op=LOAD Jul 2 07:54:08.758000 audit: BPF prog-id=31 op=LOAD Jul 2 07:54:08.758000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:54:08.758000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:54:08.759000 audit: BPF prog-id=32 op=LOAD Jul 2 07:54:08.759000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:54:08.759000 audit: BPF prog-id=33 op=LOAD Jul 2 07:54:08.759000 audit: BPF prog-id=34 op=LOAD Jul 2 07:54:08.759000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:54:08.759000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:54:08.761000 audit: BPF prog-id=35 op=LOAD Jul 2 07:54:08.761000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:54:08.764000 audit: BPF prog-id=36 op=LOAD Jul 2 07:54:08.764000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:54:08.764000 audit: BPF prog-id=37 op=LOAD Jul 2 07:54:08.764000 audit: BPF prog-id=38 op=LOAD Jul 2 07:54:08.764000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:54:08.764000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:54:08.768933 systemd[1]: Finished ldconfig.service. Jul 2 07:54:08.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.772406 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:54:08.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.778129 systemd[1]: Starting audit-rules.service... Jul 2 07:54:08.781429 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:54:08.787681 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:54:08.791000 audit: BPF prog-id=39 op=LOAD Jul 2 07:54:08.793465 systemd[1]: Starting systemd-resolved.service... Jul 2 07:54:08.797000 audit: BPF prog-id=40 op=LOAD Jul 2 07:54:08.800530 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:54:08.804781 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:54:08.808297 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:54:08.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.819678 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.824282 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:08.826791 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:08.830000 audit[1136]: SYSTEM_BOOT pid=1136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.830482 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:08.831809 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.832095 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:08.832347 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:54:08.834538 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:08.835134 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:08.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.842667 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.846545 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:08.847400 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.847613 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:08.847763 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:54:08.848915 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:54:08.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.856452 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:54:08.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.858116 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:08.858503 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:08.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.861117 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:08.861472 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:08.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.863054 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.865715 systemd[1]: Starting modprobe@drm.service... Jul 2 07:54:08.867149 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.867407 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:08.870374 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:54:08.871371 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:08.875215 systemd[1]: Starting systemd-update-done.service... Jul 2 07:54:08.875891 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:54:08.879682 systemd[1]: Finished ensure-sysext.service. Jul 2 07:54:08.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.891893 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:08.892145 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:08.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.892945 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:08.895600 systemd[1]: Finished systemd-update-done.service. Jul 2 07:54:08.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.896796 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:54:08.896936 systemd[1]: Finished modprobe@drm.service. Jul 2 07:54:08.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:08.933000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:54:08.933000 audit[1154]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8ac52e40 a2=420 a3=0 items=0 ppid=1127 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.933000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:54:08.934426 augenrules[1154]: No rules Jul 2 07:54:08.934729 systemd[1]: Finished audit-rules.service. Jul 2 07:54:08.943978 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:54:08.944703 systemd[1]: Reached target time-set.target. Jul 2 07:54:08.955306 systemd-resolved[1131]: Positive Trust Anchors: Jul 2 07:54:08.955790 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:54:08.955909 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:54:09.772982 systemd-timesyncd[1134]: Contacted time server 45.127.112.2:123 (0.flatcar.pool.ntp.org). Jul 2 07:54:09.773549 systemd-timesyncd[1134]: Initial clock synchronization to Tue 2024-07-02 07:54:09.772734 UTC. Jul 2 07:54:09.777629 systemd-resolved[1131]: Using system hostname 'ci-3510.3.5-a-4df693d906'. Jul 2 07:54:09.780914 systemd[1]: Started systemd-resolved.service. Jul 2 07:54:09.781680 systemd[1]: Reached target network.target. Jul 2 07:54:09.782181 systemd[1]: Reached target nss-lookup.target. Jul 2 07:54:09.782692 systemd[1]: Reached target sysinit.target. Jul 2 07:54:09.783314 systemd[1]: Started motdgen.path. Jul 2 07:54:09.783878 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:54:09.784907 systemd[1]: Started logrotate.timer. Jul 2 07:54:09.785548 systemd[1]: Started mdadm.timer. Jul 2 07:54:09.786057 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:54:09.786591 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:54:09.786632 systemd[1]: Reached target paths.target. Jul 2 07:54:09.787057 systemd[1]: Reached target timers.target. Jul 2 07:54:09.787967 systemd[1]: Listening on dbus.socket. Jul 2 07:54:09.790135 systemd[1]: Starting docker.socket... Jul 2 07:54:09.795226 systemd[1]: Listening on sshd.socket. Jul 2 07:54:09.795994 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:09.796797 systemd[1]: Listening on docker.socket. Jul 2 07:54:09.797411 systemd[1]: Reached target sockets.target. Jul 2 07:54:09.797976 systemd[1]: Reached target basic.target. Jul 2 07:54:09.798499 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:54:09.798547 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:54:09.800454 systemd[1]: Starting containerd.service... Jul 2 07:54:09.803729 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:54:09.806183 systemd[1]: Starting dbus.service... Jul 2 07:54:09.814261 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:54:09.820716 systemd[1]: Starting extend-filesystems.service... Jul 2 07:54:09.821127 jq[1167]: false Jul 2 07:54:09.821886 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:54:09.825000 systemd[1]: Starting motdgen.service... Jul 2 07:54:09.830444 systemd[1]: Starting prepare-helm.service... Jul 2 07:54:09.833190 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:54:09.835834 systemd[1]: Starting sshd-keygen.service... Jul 2 07:54:09.853958 systemd[1]: Starting systemd-logind.service... Jul 2 07:54:09.854668 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:09.854794 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:54:09.855477 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:54:09.859254 systemd[1]: Starting update-engine.service... Jul 2 07:54:09.863794 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:54:09.868714 systemd-networkd[999]: eth0: Gained IPv6LL Jul 2 07:54:09.873028 jq[1183]: true Jul 2 07:54:09.873615 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:54:09.875263 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:54:09.875540 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:54:09.875962 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:54:09.876165 systemd[1]: Finished motdgen.service. Jul 2 07:54:09.881120 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:54:09.881603 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:54:09.884260 systemd[1]: Reached target network-online.target. Jul 2 07:54:09.886810 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:09.889049 systemd[1]: Starting kubelet.service... Jul 2 07:54:09.889729 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:09.911798 jq[1188]: true Jul 2 07:54:09.928485 tar[1187]: linux-amd64/helm Jul 2 07:54:09.930083 dbus-daemon[1164]: [system] SELinux support is enabled Jul 2 07:54:09.932946 systemd[1]: Started dbus.service. Jul 2 07:54:09.938119 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:54:09.938179 systemd[1]: Reached target system-config.target. Jul 2 07:54:09.938875 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:54:09.938905 systemd[1]: Reached target user-config.target. Jul 2 07:54:09.965815 extend-filesystems[1168]: Found loop1 Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda1 Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda2 Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda3 Jul 2 07:54:09.965815 extend-filesystems[1168]: Found usr Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda4 Jul 2 07:54:09.965815 extend-filesystems[1168]: Found vda6 Jul 2 07:54:09.971743 extend-filesystems[1168]: Found vda7 Jul 2 07:54:09.971743 extend-filesystems[1168]: Found vda9 Jul 2 07:54:09.971743 extend-filesystems[1168]: Checking size of /dev/vda9 Jul 2 07:54:09.995567 extend-filesystems[1168]: Resized partition /dev/vda9 Jul 2 07:54:10.005628 extend-filesystems[1213]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:54:10.013398 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Jul 2 07:54:10.067347 update_engine[1181]: I0702 07:54:10.066505 1181 main.cc:92] Flatcar Update Engine starting Jul 2 07:54:10.081224 update_engine[1181]: I0702 07:54:10.073318 1181 update_check_scheduler.cc:74] Next update check in 7m39s Jul 2 07:54:10.073179 systemd[1]: Started update-engine.service. Jul 2 07:54:10.076523 systemd[1]: Started locksmithd.service. Jul 2 07:54:10.102583 bash[1218]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:54:10.103704 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:54:10.170170 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Jul 2 07:54:10.170984 coreos-metadata[1163]: Jul 02 07:54:10.170 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:54:10.194266 systemd-logind[1180]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:54:10.197920 extend-filesystems[1213]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 07:54:10.197920 extend-filesystems[1213]: old_desc_blocks = 1, new_desc_blocks = 8 Jul 2 07:54:10.197920 extend-filesystems[1213]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Jul 2 07:54:10.214009 coreos-metadata[1163]: Jul 02 07:54:10.195 INFO Fetch successful Jul 2 07:54:10.194307 systemd-logind[1180]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:54:10.214145 extend-filesystems[1168]: Resized filesystem in /dev/vda9 Jul 2 07:54:10.214145 extend-filesystems[1168]: Found vdb Jul 2 07:54:10.198262 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:54:10.198556 systemd[1]: Finished extend-filesystems.service. Jul 2 07:54:10.200098 systemd-logind[1180]: New seat seat0. Jul 2 07:54:10.215910 systemd[1]: Started systemd-logind.service. Jul 2 07:54:10.227331 unknown[1163]: wrote ssh authorized keys file for user: core Jul 2 07:54:10.247096 update-ssh-keys[1223]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:54:10.247810 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:54:10.258702 env[1190]: time="2024-07-02T07:54:10.258620759Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:54:10.353238 env[1190]: time="2024-07-02T07:54:10.353093118Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:54:10.353587 env[1190]: time="2024-07-02T07:54:10.353549627Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.360484 env[1190]: time="2024-07-02T07:54:10.360364127Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:10.360484 env[1190]: time="2024-07-02T07:54:10.360465073Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.360980 env[1190]: time="2024-07-02T07:54:10.360942733Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:10.360980 env[1190]: time="2024-07-02T07:54:10.360978110Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.361064 env[1190]: time="2024-07-02T07:54:10.360996111Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:54:10.361064 env[1190]: time="2024-07-02T07:54:10.361012786Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.361183 env[1190]: time="2024-07-02T07:54:10.361155979Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.361599 env[1190]: time="2024-07-02T07:54:10.361565193Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:10.361831 env[1190]: time="2024-07-02T07:54:10.361795571Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:10.361906 env[1190]: time="2024-07-02T07:54:10.361830436Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:54:10.361945 env[1190]: time="2024-07-02T07:54:10.361925821Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:54:10.361986 env[1190]: time="2024-07-02T07:54:10.361946920Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:54:10.371039 env[1190]: time="2024-07-02T07:54:10.370951944Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:54:10.371039 env[1190]: time="2024-07-02T07:54:10.371036295Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371060217Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371124009Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371149593Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371178221Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371202945Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371228389Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371253009Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371280 env[1190]: time="2024-07-02T07:54:10.371278334Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371552 env[1190]: time="2024-07-02T07:54:10.371301919Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.371552 env[1190]: time="2024-07-02T07:54:10.371326562Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:54:10.371982 env[1190]: time="2024-07-02T07:54:10.371939885Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:54:10.372145 env[1190]: time="2024-07-02T07:54:10.372119191Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:54:10.372820 env[1190]: time="2024-07-02T07:54:10.372759478Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:54:10.372998 env[1190]: time="2024-07-02T07:54:10.372971664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373098 env[1190]: time="2024-07-02T07:54:10.373077809Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:54:10.373268 env[1190]: time="2024-07-02T07:54:10.373245021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373405 env[1190]: time="2024-07-02T07:54:10.373381938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373560 env[1190]: time="2024-07-02T07:54:10.373537263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373652 env[1190]: time="2024-07-02T07:54:10.373634697Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373741 env[1190]: time="2024-07-02T07:54:10.373723311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373825 env[1190]: time="2024-07-02T07:54:10.373807843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373909 env[1190]: time="2024-07-02T07:54:10.373890630Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.373995 env[1190]: time="2024-07-02T07:54:10.373976974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.374169 env[1190]: time="2024-07-02T07:54:10.374146299Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:54:10.374540 env[1190]: time="2024-07-02T07:54:10.374513890Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.374649 env[1190]: time="2024-07-02T07:54:10.374629418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.374739 env[1190]: time="2024-07-02T07:54:10.374719425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.374840 env[1190]: time="2024-07-02T07:54:10.374820452Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:54:10.374944 env[1190]: time="2024-07-02T07:54:10.374916726Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:54:10.375025 env[1190]: time="2024-07-02T07:54:10.375005865Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:54:10.375131 env[1190]: time="2024-07-02T07:54:10.375110326Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:54:10.375257 env[1190]: time="2024-07-02T07:54:10.375237156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:54:10.376250 env[1190]: time="2024-07-02T07:54:10.375911788Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:54:10.378531 env[1190]: time="2024-07-02T07:54:10.376666251Z" level=info msg="Connect containerd service" Jul 2 07:54:10.378531 env[1190]: time="2024-07-02T07:54:10.377394202Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:54:10.387271 env[1190]: time="2024-07-02T07:54:10.387198402Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:54:10.387868 env[1190]: time="2024-07-02T07:54:10.387836784Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:54:10.388035 env[1190]: time="2024-07-02T07:54:10.388014466Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:54:10.388207 env[1190]: time="2024-07-02T07:54:10.388173457Z" level=info msg="containerd successfully booted in 0.140071s" Jul 2 07:54:10.389218 systemd[1]: Started containerd.service. Jul 2 07:54:10.402592 env[1190]: time="2024-07-02T07:54:10.402508519Z" level=info msg="Start subscribing containerd event" Jul 2 07:54:10.402829 env[1190]: time="2024-07-02T07:54:10.402811220Z" level=info msg="Start recovering state" Jul 2 07:54:10.402971 env[1190]: time="2024-07-02T07:54:10.402957809Z" level=info msg="Start event monitor" Jul 2 07:54:10.403498 env[1190]: time="2024-07-02T07:54:10.403467387Z" level=info msg="Start snapshots syncer" Jul 2 07:54:10.403596 env[1190]: time="2024-07-02T07:54:10.403580681Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:54:10.403691 env[1190]: time="2024-07-02T07:54:10.403673188Z" level=info msg="Start streaming server" Jul 2 07:54:10.508577 systemd-networkd[999]: eth1: Gained IPv6LL Jul 2 07:54:10.870678 locksmithd[1219]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:54:11.358214 tar[1187]: linux-amd64/LICENSE Jul 2 07:54:11.360265 tar[1187]: linux-amd64/README.md Jul 2 07:54:11.373541 systemd[1]: Finished prepare-helm.service. Jul 2 07:54:11.530832 systemd[1]: Started kubelet.service. Jul 2 07:54:11.559876 sshd_keygen[1195]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:54:11.602014 systemd[1]: Finished sshd-keygen.service. Jul 2 07:54:11.605472 systemd[1]: Starting issuegen.service... Jul 2 07:54:11.618356 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:54:11.618691 systemd[1]: Finished issuegen.service. Jul 2 07:54:11.621773 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:54:11.635173 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:54:11.638381 systemd[1]: Started getty@tty1.service. Jul 2 07:54:11.641211 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:54:11.642517 systemd[1]: Reached target getty.target. Jul 2 07:54:11.643352 systemd[1]: Reached target multi-user.target. Jul 2 07:54:11.646171 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:54:11.663098 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:54:11.663395 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:54:11.664590 systemd[1]: Startup finished in 947ms (kernel) + 6.000s (initrd) + 8.103s (userspace) = 15.052s. Jul 2 07:54:12.483288 kubelet[1236]: E0702 07:54:12.483215 1236 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:12.485804 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:12.486038 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:12.486362 systemd[1]: kubelet.service: Consumed 1.593s CPU time. Jul 2 07:54:12.645519 systemd[1]: Created slice system-sshd.slice. Jul 2 07:54:12.648105 systemd[1]: Started sshd@0-137.184.188.4:22-147.75.109.163:50116.service. Jul 2 07:54:12.737603 sshd[1258]: Accepted publickey for core from 147.75.109.163 port 50116 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:12.741586 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:12.759722 systemd[1]: Created slice user-500.slice. Jul 2 07:54:12.762302 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:54:12.770581 systemd-logind[1180]: New session 1 of user core. Jul 2 07:54:12.782359 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:54:12.786737 systemd[1]: Starting user@500.service... Jul 2 07:54:12.793033 (systemd)[1261]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:12.891373 systemd[1261]: Queued start job for default target default.target. Jul 2 07:54:12.892670 systemd[1261]: Reached target paths.target. Jul 2 07:54:12.892867 systemd[1261]: Reached target sockets.target. Jul 2 07:54:12.892994 systemd[1261]: Reached target timers.target. Jul 2 07:54:12.893182 systemd[1261]: Reached target basic.target. Jul 2 07:54:12.893372 systemd[1261]: Reached target default.target. Jul 2 07:54:12.893520 systemd[1]: Started user@500.service. Jul 2 07:54:12.893647 systemd[1261]: Startup finished in 88ms. Jul 2 07:54:12.897376 systemd[1]: Started session-1.scope. Jul 2 07:54:12.963963 systemd[1]: Started sshd@1-137.184.188.4:22-147.75.109.163:50124.service. Jul 2 07:54:13.021512 sshd[1270]: Accepted publickey for core from 147.75.109.163 port 50124 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.023881 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.031676 systemd-logind[1180]: New session 2 of user core. Jul 2 07:54:13.032849 systemd[1]: Started session-2.scope. Jul 2 07:54:13.100784 sshd[1270]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.111333 systemd[1]: Started sshd@2-137.184.188.4:22-147.75.109.163:50128.service. Jul 2 07:54:13.112285 systemd[1]: sshd@1-137.184.188.4:22-147.75.109.163:50124.service: Deactivated successfully. Jul 2 07:54:13.114192 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:54:13.116095 systemd-logind[1180]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:54:13.117857 systemd-logind[1180]: Removed session 2. Jul 2 07:54:13.166302 sshd[1275]: Accepted publickey for core from 147.75.109.163 port 50128 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.168815 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.175667 systemd[1]: Started session-3.scope. Jul 2 07:54:13.176523 systemd-logind[1180]: New session 3 of user core. Jul 2 07:54:13.257355 sshd[1275]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.262561 systemd[1]: sshd@2-137.184.188.4:22-147.75.109.163:50128.service: Deactivated successfully. Jul 2 07:54:13.263443 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:54:13.264164 systemd-logind[1180]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:54:13.265854 systemd[1]: Started sshd@3-137.184.188.4:22-147.75.109.163:50144.service. Jul 2 07:54:13.270689 systemd-logind[1180]: Removed session 3. Jul 2 07:54:13.312360 sshd[1282]: Accepted publickey for core from 147.75.109.163 port 50144 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.314573 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.322100 systemd-logind[1180]: New session 4 of user core. Jul 2 07:54:13.323026 systemd[1]: Started session-4.scope. Jul 2 07:54:13.393660 sshd[1282]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.400779 systemd[1]: sshd@3-137.184.188.4:22-147.75.109.163:50144.service: Deactivated successfully. Jul 2 07:54:13.401903 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:54:13.402884 systemd-logind[1180]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:54:13.405170 systemd[1]: Started sshd@4-137.184.188.4:22-147.75.109.163:50152.service. Jul 2 07:54:13.407358 systemd-logind[1180]: Removed session 4. Jul 2 07:54:13.456126 sshd[1288]: Accepted publickey for core from 147.75.109.163 port 50152 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.458528 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.465155 systemd[1]: Started session-5.scope. Jul 2 07:54:13.465539 systemd-logind[1180]: New session 5 of user core. Jul 2 07:54:13.547872 sudo[1291]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:54:13.548382 sudo[1291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:13.559801 dbus-daemon[1164]: \xd0]5\xc4\u007fU: received setenforce notice (enforcing=-1325249648) Jul 2 07:54:13.562979 sudo[1291]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:13.569943 sshd[1288]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.576532 systemd-logind[1180]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:54:13.576889 systemd[1]: sshd@4-137.184.188.4:22-147.75.109.163:50152.service: Deactivated successfully. Jul 2 07:54:13.577820 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:54:13.580131 systemd[1]: Started sshd@5-137.184.188.4:22-147.75.109.163:50160.service. Jul 2 07:54:13.581932 systemd-logind[1180]: Removed session 5. Jul 2 07:54:13.628696 sshd[1295]: Accepted publickey for core from 147.75.109.163 port 50160 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.631459 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.638584 systemd-logind[1180]: New session 6 of user core. Jul 2 07:54:13.639635 systemd[1]: Started session-6.scope. Jul 2 07:54:13.706570 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:54:13.707457 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:13.712765 sudo[1299]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:13.721176 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:54:13.721546 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:13.738325 systemd[1]: Stopping audit-rules.service... Jul 2 07:54:13.739000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:54:13.742309 kernel: kauditd_printk_skb: 175 callbacks suppressed Jul 2 07:54:13.742452 kernel: audit: type=1305 audit(1719906853.739:220): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:54:13.739000 audit[1302]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca5e39160 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.746481 kernel: audit: type=1300 audit(1719906853.739:220): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca5e39160 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.739000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:54:13.751495 auditctl[1302]: No rules Jul 2 07:54:13.752969 kernel: audit: type=1327 audit(1719906853.739:220): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:54:13.753340 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:54:13.753585 systemd[1]: Stopped audit-rules.service. Jul 2 07:54:13.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.756060 systemd[1]: Starting audit-rules.service... Jul 2 07:54:13.758780 kernel: audit: type=1131 audit(1719906853.752:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.787919 augenrules[1319]: No rules Jul 2 07:54:13.789643 systemd[1]: Finished audit-rules.service. Jul 2 07:54:13.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.790947 sudo[1298]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:13.789000 audit[1298]: USER_END pid=1298 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.800845 kernel: audit: type=1130 audit(1719906853.788:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.801025 kernel: audit: type=1106 audit(1719906853.789:223): pid=1298 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.809731 kernel: audit: type=1104 audit(1719906853.789:224): pid=1298 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.789000 audit[1298]: CRED_DISP pid=1298 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.807973 systemd[1]: Started sshd@6-137.184.188.4:22-147.75.109.163:50174.service. Jul 2 07:54:13.802762 sshd[1295]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.188.4:22-147.75.109.163:50174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.813319 systemd[1]: sshd@5-137.184.188.4:22-147.75.109.163:50160.service: Deactivated successfully. Jul 2 07:54:13.814221 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:54:13.816213 systemd-logind[1180]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:54:13.817518 kernel: audit: type=1130 audit(1719906853.806:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.188.4:22-147.75.109.163:50174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.818022 systemd-logind[1180]: Removed session 6. Jul 2 07:54:13.809000 audit[1295]: USER_END pid=1295 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.810000 audit[1295]: CRED_DISP pid=1295 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.830045 kernel: audit: type=1106 audit(1719906853.809:226): pid=1295 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.830225 kernel: audit: type=1104 audit(1719906853.810:227): pid=1295 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-137.184.188.4:22-147.75.109.163:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.864000 audit[1324]: USER_ACCT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.866166 sshd[1324]: Accepted publickey for core from 147.75.109.163 port 50174 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:54:13.866000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.866000 audit[1324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8aa94640 a2=3 a3=0 items=0 ppid=1 pid=1324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.866000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:13.868618 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.874971 systemd-logind[1180]: New session 7 of user core. Jul 2 07:54:13.875801 systemd[1]: Started session-7.scope. Jul 2 07:54:13.880000 audit[1324]: USER_START pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.883000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:13.940000 audit[1328]: USER_ACCT pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.942004 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:54:13.940000 audit[1328]: CRED_REFR pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.942540 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:13.943000 audit[1328]: USER_START pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.980133 systemd[1]: Starting docker.service... Jul 2 07:54:14.058002 env[1338]: time="2024-07-02T07:54:14.057926090Z" level=info msg="Starting up" Jul 2 07:54:14.061562 env[1338]: time="2024-07-02T07:54:14.061492406Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:54:14.061562 env[1338]: time="2024-07-02T07:54:14.061540730Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:54:14.061846 env[1338]: time="2024-07-02T07:54:14.061601856Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:54:14.061846 env[1338]: time="2024-07-02T07:54:14.061621140Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:54:14.074666 env[1338]: time="2024-07-02T07:54:14.074539392Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:54:14.075013 env[1338]: time="2024-07-02T07:54:14.074988007Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:54:14.075171 env[1338]: time="2024-07-02T07:54:14.075148277Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:54:14.075246 env[1338]: time="2024-07-02T07:54:14.075232034Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:54:14.088034 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2472382797-merged.mount: Deactivated successfully. Jul 2 07:54:14.250950 env[1338]: time="2024-07-02T07:54:14.250884504Z" level=info msg="Loading containers: start." Jul 2 07:54:14.343000 audit[1369]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.343000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffe54d7d90 a2=0 a3=7fffe54d7d7c items=0 ppid=1338 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:54:14.347000 audit[1371]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.347000 audit[1371]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd37ea2e80 a2=0 a3=7ffd37ea2e6c items=0 ppid=1338 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:54:14.350000 audit[1373]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.350000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc69ae8540 a2=0 a3=7ffc69ae852c items=0 ppid=1338 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:54:14.354000 audit[1375]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.354000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff3cc31450 a2=0 a3=7fff3cc3143c items=0 ppid=1338 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:54:14.358000 audit[1377]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.358000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc603dc420 a2=0 a3=7ffc603dc40c items=0 ppid=1338 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:54:14.384000 audit[1382]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.384000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6c4946f0 a2=0 a3=7ffe6c4946dc items=0 ppid=1338 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.384000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:54:14.395000 audit[1384]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.395000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0eea3ee0 a2=0 a3=7ffc0eea3ecc items=0 ppid=1338 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:54:14.399000 audit[1386]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.399000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe4c958800 a2=0 a3=7ffe4c9587ec items=0 ppid=1338 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.399000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:54:14.403000 audit[1388]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.403000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe184fb120 a2=0 a3=7ffe184fb10c items=0 ppid=1338 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:14.415000 audit[1392]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.415000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcf4d443f0 a2=0 a3=7ffcf4d443dc items=0 ppid=1338 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.415000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:14.417000 audit[1393]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.417000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc45aef860 a2=0 a3=7ffc45aef84c items=0 ppid=1338 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:14.436480 kernel: Initializing XFRM netlink socket Jul 2 07:54:14.485063 env[1338]: time="2024-07-02T07:54:14.485005427Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:54:14.525000 audit[1401]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.525000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff69243080 a2=0 a3=7fff6924306c items=0 ppid=1338 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.525000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:54:14.539000 audit[1404]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.539000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd935d7170 a2=0 a3=7ffd935d715c items=0 ppid=1338 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.539000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:54:14.545000 audit[1407]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.545000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffe1df8f70 a2=0 a3=7fffe1df8f5c items=0 ppid=1338 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:54:14.548000 audit[1409]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.548000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd1a44c420 a2=0 a3=7ffd1a44c40c items=0 ppid=1338 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.548000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:54:14.552000 audit[1411]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.552000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd5b5415d0 a2=0 a3=7ffd5b5415bc items=0 ppid=1338 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:54:14.556000 audit[1413]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.556000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff4013cf20 a2=0 a3=7fff4013cf0c items=0 ppid=1338 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:54:14.561000 audit[1416]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.561000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc75395010 a2=0 a3=7ffc75394ffc items=0 ppid=1338 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.561000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:54:14.574000 audit[1419]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.574000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffea7c89970 a2=0 a3=7ffea7c8995c items=0 ppid=1338 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:54:14.578000 audit[1421]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.578000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffede0b38b0 a2=0 a3=7ffede0b389c items=0 ppid=1338 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:54:14.581000 audit[1423]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.581000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffca7cbd4f0 a2=0 a3=7ffca7cbd4dc items=0 ppid=1338 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:54:14.585000 audit[1425]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.585000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc12b6f750 a2=0 a3=7ffc12b6f73c items=0 ppid=1338 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:54:14.587336 systemd-networkd[999]: docker0: Link UP Jul 2 07:54:14.599000 audit[1429]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.599000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9828f830 a2=0 a3=7ffc9828f81c items=0 ppid=1338 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:14.603000 audit[1430]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:14.603000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdcfc08380 a2=0 a3=7ffdcfc0836c items=0 ppid=1338 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:14.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:14.605943 env[1338]: time="2024-07-02T07:54:14.605898582Z" level=info msg="Loading containers: done." Jul 2 07:54:14.625751 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2220469677-merged.mount: Deactivated successfully. Jul 2 07:54:14.633164 env[1338]: time="2024-07-02T07:54:14.633105993Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:54:14.633668 env[1338]: time="2024-07-02T07:54:14.633639727Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:54:14.633891 env[1338]: time="2024-07-02T07:54:14.633876034Z" level=info msg="Daemon has completed initialization" Jul 2 07:54:14.654596 systemd[1]: Started docker.service. Jul 2 07:54:14.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:14.663911 env[1338]: time="2024-07-02T07:54:14.663821133Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:54:14.695799 systemd[1]: Starting coreos-metadata.service... Jul 2 07:54:14.746956 coreos-metadata[1456]: Jul 02 07:54:14.746 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:54:14.759331 coreos-metadata[1456]: Jul 02 07:54:14.759 INFO Fetch successful Jul 2 07:54:14.777194 systemd[1]: Finished coreos-metadata.service. Jul 2 07:54:14.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:15.716354 env[1190]: time="2024-07-02T07:54:15.716255092Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 07:54:16.451980 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount931818768.mount: Deactivated successfully. Jul 2 07:54:18.632571 env[1190]: time="2024-07-02T07:54:18.632490924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:18.636557 env[1190]: time="2024-07-02T07:54:18.636493010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:18.639194 env[1190]: time="2024-07-02T07:54:18.639141080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:18.641026 env[1190]: time="2024-07-02T07:54:18.640970636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:18.642282 env[1190]: time="2024-07-02T07:54:18.642214915Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe\"" Jul 2 07:54:18.655272 env[1190]: time="2024-07-02T07:54:18.655186764Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 07:54:21.122772 env[1190]: time="2024-07-02T07:54:21.122663318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:21.125537 env[1190]: time="2024-07-02T07:54:21.125488415Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:21.128054 env[1190]: time="2024-07-02T07:54:21.128005047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:21.131244 env[1190]: time="2024-07-02T07:54:21.131194151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:21.132301 env[1190]: time="2024-07-02T07:54:21.132241546Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974\"" Jul 2 07:54:21.149485 env[1190]: time="2024-07-02T07:54:21.149394782Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 07:54:22.741577 kernel: kauditd_printk_skb: 85 callbacks suppressed Jul 2 07:54:22.741980 kernel: audit: type=1130 audit(1719906862.736:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.737562 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:54:22.737894 systemd[1]: Stopped kubelet.service. Jul 2 07:54:22.737995 systemd[1]: kubelet.service: Consumed 1.593s CPU time. Jul 2 07:54:22.741171 systemd[1]: Starting kubelet.service... Jul 2 07:54:22.747943 kernel: audit: type=1131 audit(1719906862.736:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.920331 systemd[1]: Started kubelet.service. Jul 2 07:54:22.924552 kernel: audit: type=1130 audit(1719906862.919:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:23.032542 kubelet[1496]: E0702 07:54:23.031271 1496 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:23.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:23.038523 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:23.038725 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:23.043490 kernel: audit: type=1131 audit(1719906863.037:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:23.297571 env[1190]: time="2024-07-02T07:54:23.296942477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:23.299403 env[1190]: time="2024-07-02T07:54:23.299352510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:23.301905 env[1190]: time="2024-07-02T07:54:23.301850606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:23.305458 env[1190]: time="2024-07-02T07:54:23.305357655Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940\"" Jul 2 07:54:23.307357 env[1190]: time="2024-07-02T07:54:23.304612119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:23.324413 env[1190]: time="2024-07-02T07:54:23.324351720Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 07:54:24.828745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount942958417.mount: Deactivated successfully. Jul 2 07:54:25.670210 env[1190]: time="2024-07-02T07:54:25.670130202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:25.671980 env[1190]: time="2024-07-02T07:54:25.671924791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:25.673720 env[1190]: time="2024-07-02T07:54:25.673616568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:25.675057 env[1190]: time="2024-07-02T07:54:25.675016097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:25.675603 env[1190]: time="2024-07-02T07:54:25.675565046Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 07:54:25.691378 env[1190]: time="2024-07-02T07:54:25.691335869Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 07:54:26.329172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1271503671.mount: Deactivated successfully. Jul 2 07:54:27.490532 env[1190]: time="2024-07-02T07:54:27.490442678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:27.492114 env[1190]: time="2024-07-02T07:54:27.492067192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:27.494488 env[1190]: time="2024-07-02T07:54:27.494440788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:27.496927 env[1190]: time="2024-07-02T07:54:27.496873640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:27.497752 env[1190]: time="2024-07-02T07:54:27.497720643Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 07:54:27.509670 env[1190]: time="2024-07-02T07:54:27.509615383Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:54:28.081091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4284867442.mount: Deactivated successfully. Jul 2 07:54:28.089920 env[1190]: time="2024-07-02T07:54:28.089850204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.094103 env[1190]: time="2024-07-02T07:54:28.094029795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.097508 env[1190]: time="2024-07-02T07:54:28.097439515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.099336 env[1190]: time="2024-07-02T07:54:28.099266654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.100193 env[1190]: time="2024-07-02T07:54:28.100141242Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:54:28.119331 env[1190]: time="2024-07-02T07:54:28.119272900Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 07:54:28.758504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1785561589.mount: Deactivated successfully. Jul 2 07:54:31.812216 env[1190]: time="2024-07-02T07:54:31.812109345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.814880 env[1190]: time="2024-07-02T07:54:31.814814922Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.817313 env[1190]: time="2024-07-02T07:54:31.817262926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.819720 env[1190]: time="2024-07-02T07:54:31.819659545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.821072 env[1190]: time="2024-07-02T07:54:31.820992452Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Jul 2 07:54:33.060667 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:54:33.060876 systemd[1]: Stopped kubelet.service. Jul 2 07:54:33.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.065620 kernel: audit: type=1130 audit(1719906873.059:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.064797 systemd[1]: Starting kubelet.service... Jul 2 07:54:33.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.070505 kernel: audit: type=1131 audit(1719906873.059:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.254571 kernel: audit: type=1130 audit(1719906873.248:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:33.249819 systemd[1]: Started kubelet.service. Jul 2 07:54:33.337693 kubelet[1593]: E0702 07:54:33.337528 1593 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:33.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:33.343858 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:33.344064 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:33.348455 kernel: audit: type=1131 audit(1719906873.342:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:35.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.079304 systemd[1]: Stopped kubelet.service. Jul 2 07:54:35.084850 kernel: audit: type=1130 audit(1719906875.078:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.085024 kernel: audit: type=1131 audit(1719906875.079:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.088598 systemd[1]: Starting kubelet.service... Jul 2 07:54:35.124181 systemd[1]: Reloading. Jul 2 07:54:35.289225 /usr/lib/systemd/system-generators/torcx-generator[1627]: time="2024-07-02T07:54:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:35.289272 /usr/lib/systemd/system-generators/torcx-generator[1627]: time="2024-07-02T07:54:35Z" level=info msg="torcx already run" Jul 2 07:54:35.393379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:35.394159 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:35.420768 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:35.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.507088 kernel: audit: type=1400 audit(1719906875.497:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.507290 kernel: audit: type=1400 audit(1719906875.497:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.511467 kernel: audit: type=1400 audit(1719906875.497:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515524 kernel: audit: type=1400 audit(1719906875.497:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit: BPF prog-id=46 op=LOAD Jul 2 07:54:35.502000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit: BPF prog-id=47 op=LOAD Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit: BPF prog-id=48 op=LOAD Jul 2 07:54:35.506000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:54:35.506000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit: BPF prog-id=49 op=LOAD Jul 2 07:54:35.510000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit: BPF prog-id=50 op=LOAD Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.514000 audit: BPF prog-id=51 op=LOAD Jul 2 07:54:35.514000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:54:35.514000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.515000 audit: BPF prog-id=52 op=LOAD Jul 2 07:54:35.515000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.517000 audit: BPF prog-id=53 op=LOAD Jul 2 07:54:35.517000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit: BPF prog-id=54 op=LOAD Jul 2 07:54:35.519000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit: BPF prog-id=55 op=LOAD Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit: BPF prog-id=56 op=LOAD Jul 2 07:54:35.520000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:54:35.520000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.521000 audit: BPF prog-id=57 op=LOAD Jul 2 07:54:35.521000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:54:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit: BPF prog-id=58 op=LOAD Jul 2 07:54:35.524000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit: BPF prog-id=59 op=LOAD Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:35.524000 audit: BPF prog-id=60 op=LOAD Jul 2 07:54:35.524000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:54:35.524000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:54:35.542859 systemd[1]: Started kubelet.service. Jul 2 07:54:35.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.553865 systemd[1]: Stopping kubelet.service... Jul 2 07:54:35.555208 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:54:35.555480 systemd[1]: Stopped kubelet.service. Jul 2 07:54:35.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.557871 systemd[1]: Starting kubelet.service... Jul 2 07:54:35.697761 systemd[1]: Started kubelet.service. Jul 2 07:54:35.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.779034 kubelet[1682]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:35.779638 kubelet[1682]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:54:35.779746 kubelet[1682]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:35.780002 kubelet[1682]: I0702 07:54:35.779958 1682 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:54:36.542833 kubelet[1682]: I0702 07:54:36.542768 1682 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:54:36.542833 kubelet[1682]: I0702 07:54:36.542809 1682 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:54:36.543118 kubelet[1682]: I0702 07:54:36.543092 1682 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:54:36.600116 kubelet[1682]: I0702 07:54:36.599807 1682 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:54:36.601810 kubelet[1682]: E0702 07:54:36.601774 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://137.184.188.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.617596 kubelet[1682]: I0702 07:54:36.617548 1682 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:54:36.620821 kubelet[1682]: I0702 07:54:36.620732 1682 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:54:36.621291 kubelet[1682]: I0702 07:54:36.621016 1682 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-4df693d906","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:54:36.622371 kubelet[1682]: I0702 07:54:36.622343 1682 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:54:36.622602 kubelet[1682]: I0702 07:54:36.622587 1682 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:54:36.622886 kubelet[1682]: I0702 07:54:36.622869 1682 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:36.623885 kubelet[1682]: I0702 07:54:36.623865 1682 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:54:36.623994 kubelet[1682]: I0702 07:54:36.623981 1682 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:54:36.624133 kubelet[1682]: I0702 07:54:36.624117 1682 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:54:36.624300 kubelet[1682]: I0702 07:54:36.624217 1682 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:54:36.630270 kubelet[1682]: W0702 07:54:36.630193 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://137.184.188.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-4df693d906&limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.630524 kubelet[1682]: E0702 07:54:36.630508 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://137.184.188.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-4df693d906&limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.631114 kubelet[1682]: W0702 07:54:36.631061 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://137.184.188.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.631305 kubelet[1682]: E0702 07:54:36.631288 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://137.184.188.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.631537 kubelet[1682]: I0702 07:54:36.631517 1682 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:54:36.636942 kubelet[1682]: I0702 07:54:36.636892 1682 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:54:36.637272 kubelet[1682]: W0702 07:54:36.637242 1682 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:54:36.638571 kubelet[1682]: I0702 07:54:36.638537 1682 server.go:1264] "Started kubelet" Jul 2 07:54:36.639000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:36.639000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009198f0 a1=c0009d4930 a2=c0009198c0 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:36.641197 kubelet[1682]: I0702 07:54:36.641118 1682 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:54:36.639000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:36.639000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009e0500 a1=c0009d4948 a2=c000919980 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:36.641680 kubelet[1682]: I0702 07:54:36.641653 1682 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:54:36.641923 kubelet[1682]: I0702 07:54:36.641903 1682 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:54:36.644000 audit[1693]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.644000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1b49f960 a2=0 a3=7fff1b49f94c items=0 ppid=1682 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:54:36.646000 audit[1694]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.646000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd25cc2a0 a2=0 a3=7ffdd25cc28c items=0 ppid=1682 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:54:36.650406 kubelet[1682]: I0702 07:54:36.650362 1682 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:54:36.651173 kubelet[1682]: I0702 07:54:36.651138 1682 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:54:36.651293 kubelet[1682]: I0702 07:54:36.651243 1682 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:54:36.652660 kubelet[1682]: E0702 07:54:36.652625 1682 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:54:36.652864 kubelet[1682]: W0702 07:54:36.652807 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://137.184.188.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.652935 kubelet[1682]: E0702 07:54:36.652881 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://137.184.188.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.652999 kubelet[1682]: E0702 07:54:36.652966 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.188.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-4df693d906?timeout=10s\": dial tcp 137.184.188.4:6443: connect: connection refused" interval="200ms" Jul 2 07:54:36.653329 kubelet[1682]: I0702 07:54:36.653279 1682 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:54:36.654000 audit[1696]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.654000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcaa68ede0 a2=0 a3=7ffcaa68edcc items=0 ppid=1682 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:36.659886 kubelet[1682]: I0702 07:54:36.659812 1682 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:54:36.660371 kubelet[1682]: I0702 07:54:36.660351 1682 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:54:36.661171 kubelet[1682]: E0702 07:54:36.661033 1682 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://137.184.188.4:6443/api/v1/namespaces/default/events\": dial tcp 137.184.188.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-4df693d906.17de56311cca059e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-4df693d906,UID:ci-3510.3.5-a-4df693d906,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-4df693d906,},FirstTimestamp:2024-07-02 07:54:36.638496158 +0000 UTC m=+0.932010494,LastTimestamp:2024-07-02 07:54:36.638496158 +0000 UTC m=+0.932010494,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-4df693d906,}" Jul 2 07:54:36.661559 kubelet[1682]: I0702 07:54:36.661539 1682 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:54:36.661640 kubelet[1682]: I0702 07:54:36.661630 1682 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:54:36.661811 kubelet[1682]: I0702 07:54:36.661793 1682 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:54:36.665022 kubelet[1682]: I0702 07:54:36.664988 1682 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:54:36.665000 audit[1699]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.665000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff14564700 a2=0 a3=7fff145646ec items=0 ppid=1682 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:36.690000 audit[1703]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.690000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffefe781b20 a2=0 a3=7ffefe781b0c items=0 ppid=1682 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:54:36.692398 kubelet[1682]: I0702 07:54:36.692346 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:54:36.693000 audit[1704]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:36.693000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0ba18130 a2=0 a3=7ffd0ba1811c items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:54:36.695752 kubelet[1682]: I0702 07:54:36.695696 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:54:36.695854 kubelet[1682]: I0702 07:54:36.695761 1682 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:54:36.695854 kubelet[1682]: I0702 07:54:36.695810 1682 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:54:36.695931 kubelet[1682]: E0702 07:54:36.695869 1682 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:54:36.696000 audit[1706]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.696000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea4aa0430 a2=0 a3=7ffea4aa041c items=0 ppid=1682 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:54:36.698000 audit[1707]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:36.698000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff287c2480 a2=0 a3=7fff287c246c items=0 ppid=1682 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:54:36.701632 kubelet[1682]: W0702 07:54:36.701574 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://137.184.188.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.702145 kubelet[1682]: E0702 07:54:36.702116 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://137.184.188.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:36.702145 kubelet[1682]: I0702 07:54:36.701973 1682 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:54:36.702253 kubelet[1682]: I0702 07:54:36.702153 1682 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:54:36.702253 kubelet[1682]: I0702 07:54:36.702198 1682 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:36.701000 audit[1709]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:36.701000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc9d7c17a0 a2=0 a3=7ffc9d7c178c items=0 ppid=1682 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:54:36.702000 audit[1711]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:36.702000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe4bb23b0 a2=0 a3=7fffe4bb239c items=0 ppid=1682 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:54:36.703000 audit[1708]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.703000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd25ae18c0 a2=0 a3=7ffd25ae18ac items=0 ppid=1682 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:54:36.705740 kubelet[1682]: I0702 07:54:36.705703 1682 policy_none.go:49] "None policy: Start" Jul 2 07:54:36.707122 kubelet[1682]: I0702 07:54:36.707095 1682 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:54:36.707197 kubelet[1682]: I0702 07:54:36.707165 1682 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:54:36.706000 audit[1712]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:36.706000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2e031dd0 a2=0 a3=7ffc2e031dbc items=0 ppid=1682 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:54:36.715605 systemd[1]: Created slice kubepods.slice. Jul 2 07:54:36.721945 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:54:36.726325 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:54:36.733553 kubelet[1682]: I0702 07:54:36.733511 1682 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:54:36.732000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.732000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:36.732000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000056a20 a1=c000a873c8 a2=c000056960 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:36.736365 kubelet[1682]: I0702 07:54:36.736331 1682 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:54:36.737119 kubelet[1682]: I0702 07:54:36.736906 1682 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:54:36.737266 kubelet[1682]: I0702 07:54:36.737240 1682 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:54:36.739274 kubelet[1682]: E0702 07:54:36.739237 1682 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-4df693d906\" not found" Jul 2 07:54:36.753716 kubelet[1682]: I0702 07:54:36.753628 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.754381 kubelet[1682]: E0702 07:54:36.754342 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://137.184.188.4:6443/api/v1/nodes\": dial tcp 137.184.188.4:6443: connect: connection refused" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.796880 kubelet[1682]: I0702 07:54:36.796705 1682 topology_manager.go:215] "Topology Admit Handler" podUID="36389e796e60f72dc65abf2b58adc8c0" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.800215 kubelet[1682]: I0702 07:54:36.798645 1682 topology_manager.go:215] "Topology Admit Handler" podUID="ef54703895bfc1841ec958b79e4d9477" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.803205 kubelet[1682]: I0702 07:54:36.802722 1682 topology_manager.go:215] "Topology Admit Handler" podUID="89ee6d44ac99b5fdd2b38264ed25ae05" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.807032 systemd[1]: Created slice kubepods-burstable-pod36389e796e60f72dc65abf2b58adc8c0.slice. Jul 2 07:54:36.817631 systemd[1]: Created slice kubepods-burstable-podef54703895bfc1841ec958b79e4d9477.slice. Jul 2 07:54:36.822267 systemd[1]: Created slice kubepods-burstable-pod89ee6d44ac99b5fdd2b38264ed25ae05.slice. Jul 2 07:54:36.852622 kubelet[1682]: I0702 07:54:36.852565 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852622 kubelet[1682]: I0702 07:54:36.852630 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852821 kubelet[1682]: I0702 07:54:36.852661 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852821 kubelet[1682]: I0702 07:54:36.852689 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852821 kubelet[1682]: I0702 07:54:36.852721 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852821 kubelet[1682]: I0702 07:54:36.852754 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852821 kubelet[1682]: I0702 07:54:36.852788 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852976 kubelet[1682]: I0702 07:54:36.852814 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.852976 kubelet[1682]: I0702 07:54:36.852841 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/89ee6d44ac99b5fdd2b38264ed25ae05-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-4df693d906\" (UID: \"89ee6d44ac99b5fdd2b38264ed25ae05\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.853588 kubelet[1682]: E0702 07:54:36.853539 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.188.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-4df693d906?timeout=10s\": dial tcp 137.184.188.4:6443: connect: connection refused" interval="400ms" Jul 2 07:54:36.956662 kubelet[1682]: I0702 07:54:36.956627 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:36.957045 kubelet[1682]: E0702 07:54:36.956940 1682 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://137.184.188.4:6443/api/v1/namespaces/default/events\": dial tcp 137.184.188.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-4df693d906.17de56311cca059e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-4df693d906,UID:ci-3510.3.5-a-4df693d906,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-4df693d906,},FirstTimestamp:2024-07-02 07:54:36.638496158 +0000 UTC m=+0.932010494,LastTimestamp:2024-07-02 07:54:36.638496158 +0000 UTC m=+0.932010494,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-4df693d906,}" Jul 2 07:54:36.957398 kubelet[1682]: E0702 07:54:36.957346 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://137.184.188.4:6443/api/v1/nodes\": dial tcp 137.184.188.4:6443: connect: connection refused" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:37.114954 kubelet[1682]: E0702 07:54:37.114877 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.116491 env[1190]: time="2024-07-02T07:54:37.115874379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-4df693d906,Uid:36389e796e60f72dc65abf2b58adc8c0,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:37.121884 kubelet[1682]: E0702 07:54:37.121818 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.123144 env[1190]: time="2024-07-02T07:54:37.122637103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-4df693d906,Uid:ef54703895bfc1841ec958b79e4d9477,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:37.125884 kubelet[1682]: E0702 07:54:37.125834 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.126840 env[1190]: time="2024-07-02T07:54:37.126791204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-4df693d906,Uid:89ee6d44ac99b5fdd2b38264ed25ae05,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:37.254800 kubelet[1682]: E0702 07:54:37.254723 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.188.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-4df693d906?timeout=10s\": dial tcp 137.184.188.4:6443: connect: connection refused" interval="800ms" Jul 2 07:54:37.358855 kubelet[1682]: I0702 07:54:37.358753 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:37.359339 kubelet[1682]: E0702 07:54:37.359272 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://137.184.188.4:6443/api/v1/nodes\": dial tcp 137.184.188.4:6443: connect: connection refused" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:37.507343 kubelet[1682]: W0702 07:54:37.506673 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://137.184.188.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.507343 kubelet[1682]: E0702 07:54:37.506765 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://137.184.188.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.685264 kubelet[1682]: W0702 07:54:37.685147 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://137.184.188.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-4df693d906&limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.685264 kubelet[1682]: E0702 07:54:37.685245 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://137.184.188.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-4df693d906&limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.695124 kubelet[1682]: W0702 07:54:37.695041 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://137.184.188.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.695124 kubelet[1682]: E0702 07:54:37.695089 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://137.184.188.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.706601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2706327474.mount: Deactivated successfully. Jul 2 07:54:37.714683 env[1190]: time="2024-07-02T07:54:37.714024222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.718272 env[1190]: time="2024-07-02T07:54:37.718207246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.719478 env[1190]: time="2024-07-02T07:54:37.719411445Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.720338 env[1190]: time="2024-07-02T07:54:37.720309980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.721098 env[1190]: time="2024-07-02T07:54:37.721072812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.722084 env[1190]: time="2024-07-02T07:54:37.722058808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.727563 env[1190]: time="2024-07-02T07:54:37.727510084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.732305 env[1190]: time="2024-07-02T07:54:37.732222619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.736804 env[1190]: time="2024-07-02T07:54:37.736737189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.740170 env[1190]: time="2024-07-02T07:54:37.740033288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.740940 env[1190]: time="2024-07-02T07:54:37.740898967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.741718 env[1190]: time="2024-07-02T07:54:37.741676760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.785127 env[1190]: time="2024-07-02T07:54:37.784258908Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:37.785127 env[1190]: time="2024-07-02T07:54:37.784322066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:37.785127 env[1190]: time="2024-07-02T07:54:37.784334725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:37.785659 env[1190]: time="2024-07-02T07:54:37.785587178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e200f08c1e9d17f11647750eeb235761a50d3700dc97cce0d308b804eeb9632 pid=1732 runtime=io.containerd.runc.v2 Jul 2 07:54:37.787526 env[1190]: time="2024-07-02T07:54:37.787447428Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:37.787670 env[1190]: time="2024-07-02T07:54:37.787535135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:37.787670 env[1190]: time="2024-07-02T07:54:37.787561749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:37.789844 env[1190]: time="2024-07-02T07:54:37.789786839Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84d032810dfe024370618904f26251ffdee771c4e4fe4708bfa83e3e08795756 pid=1722 runtime=io.containerd.runc.v2 Jul 2 07:54:37.799195 env[1190]: time="2024-07-02T07:54:37.799084825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:37.799356 env[1190]: time="2024-07-02T07:54:37.799227831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:37.799356 env[1190]: time="2024-07-02T07:54:37.799288422Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:37.799848 env[1190]: time="2024-07-02T07:54:37.799780444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/560914c15bc314722e5a4a971249507a3a9bfefe480e012133ee4126e103d5fb pid=1741 runtime=io.containerd.runc.v2 Jul 2 07:54:37.811377 systemd[1]: Started cri-containerd-0e200f08c1e9d17f11647750eeb235761a50d3700dc97cce0d308b804eeb9632.scope. Jul 2 07:54:37.827153 systemd[1]: Started cri-containerd-84d032810dfe024370618904f26251ffdee771c4e4fe4708bfa83e3e08795756.scope. Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit: BPF prog-id=61 op=LOAD Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1732 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323030663038633165396431376631313634373735306565623233 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1732 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323030663038633165396431376631313634373735306565623233 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.844000 audit: BPF prog-id=62 op=LOAD Jul 2 07:54:37.844000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a5f0 items=0 ppid=1732 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323030663038633165396431376631313634373735306565623233 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit: BPF prog-id=63 op=LOAD Jul 2 07:54:37.845000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a638 items=0 ppid=1732 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323030663038633165396431376631313634373735306565623233 Jul 2 07:54:37.845000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:54:37.845000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.845000 audit: BPF prog-id=64 op=LOAD Jul 2 07:54:37.845000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028aa48 items=0 ppid=1732 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323030663038633165396431376631313634373735306565623233 Jul 2 07:54:37.861054 systemd[1]: Started cri-containerd-560914c15bc314722e5a4a971249507a3a9bfefe480e012133ee4126e103d5fb.scope. Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.866000 audit: BPF prog-id=65 op=LOAD Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643033323831306466653032343337303631383930346632363235 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643033323831306466653032343337303631383930346632363235 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit: BPF prog-id=66 op=LOAD Jul 2 07:54:37.871000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002185f0 items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643033323831306466653032343337303631383930346632363235 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit: BPF prog-id=67 op=LOAD Jul 2 07:54:37.871000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218638 items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643033323831306466653032343337303631383930346632363235 Jul 2 07:54:37.871000 audit: BPF prog-id=67 op=UNLOAD Jul 2 07:54:37.871000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.871000 audit: BPF prog-id=68 op=LOAD Jul 2 07:54:37.871000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218a48 items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643033323831306466653032343337303631383930346632363235 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.891000 audit: BPF prog-id=69 op=LOAD Jul 2 07:54:37.892000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.892000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1741 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303931346331356263333134373232653561346139373132343935 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1741 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303931346331356263333134373232653561346139373132343935 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.893000 audit: BPF prog-id=70 op=LOAD Jul 2 07:54:37.893000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025080 items=0 ppid=1741 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303931346331356263333134373232653561346139373132343935 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.894000 audit: BPF prog-id=71 op=LOAD Jul 2 07:54:37.894000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000250c8 items=0 ppid=1741 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303931346331356263333134373232653561346139373132343935 Jul 2 07:54:37.895000 audit: BPF prog-id=71 op=UNLOAD Jul 2 07:54:37.895000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.895000 audit: BPF prog-id=72 op=LOAD Jul 2 07:54:37.895000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000254d8 items=0 ppid=1741 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303931346331356263333134373232653561346139373132343935 Jul 2 07:54:37.921315 env[1190]: time="2024-07-02T07:54:37.921243331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-4df693d906,Uid:ef54703895bfc1841ec958b79e4d9477,Namespace:kube-system,Attempt:0,} returns sandbox id \"84d032810dfe024370618904f26251ffdee771c4e4fe4708bfa83e3e08795756\"" Jul 2 07:54:37.923766 kubelet[1682]: E0702 07:54:37.923727 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.924638 kubelet[1682]: W0702 07:54:37.924579 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://137.184.188.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.924750 kubelet[1682]: E0702 07:54:37.924650 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://137.184.188.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.188.4:6443: connect: connection refused Jul 2 07:54:37.928627 env[1190]: time="2024-07-02T07:54:37.928573891Z" level=info msg="CreateContainer within sandbox \"84d032810dfe024370618904f26251ffdee771c4e4fe4708bfa83e3e08795756\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:54:37.944195 env[1190]: time="2024-07-02T07:54:37.944137008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-4df693d906,Uid:36389e796e60f72dc65abf2b58adc8c0,Namespace:kube-system,Attempt:0,} returns sandbox id \"0e200f08c1e9d17f11647750eeb235761a50d3700dc97cce0d308b804eeb9632\"" Jul 2 07:54:37.946042 kubelet[1682]: E0702 07:54:37.945970 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.949306 env[1190]: time="2024-07-02T07:54:37.949250729Z" level=info msg="CreateContainer within sandbox \"0e200f08c1e9d17f11647750eeb235761a50d3700dc97cce0d308b804eeb9632\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:54:37.965723 env[1190]: time="2024-07-02T07:54:37.965652268Z" level=info msg="CreateContainer within sandbox \"84d032810dfe024370618904f26251ffdee771c4e4fe4708bfa83e3e08795756\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d4f9c2d633cfc9e30f8855befae52a68048b2a90fc6363e6f5861ea81173d6c1\"" Jul 2 07:54:37.966895 env[1190]: time="2024-07-02T07:54:37.966858986Z" level=info msg="StartContainer for \"d4f9c2d633cfc9e30f8855befae52a68048b2a90fc6363e6f5861ea81173d6c1\"" Jul 2 07:54:37.972722 env[1190]: time="2024-07-02T07:54:37.972669312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-4df693d906,Uid:89ee6d44ac99b5fdd2b38264ed25ae05,Namespace:kube-system,Attempt:0,} returns sandbox id \"560914c15bc314722e5a4a971249507a3a9bfefe480e012133ee4126e103d5fb\"" Jul 2 07:54:37.974096 kubelet[1682]: E0702 07:54:37.974041 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:37.977225 env[1190]: time="2024-07-02T07:54:37.977123144Z" level=info msg="CreateContainer within sandbox \"560914c15bc314722e5a4a971249507a3a9bfefe480e012133ee4126e103d5fb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:54:37.977820 env[1190]: time="2024-07-02T07:54:37.977601986Z" level=info msg="CreateContainer within sandbox \"0e200f08c1e9d17f11647750eeb235761a50d3700dc97cce0d308b804eeb9632\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"83740fc52d43c22c4e129c824b178f78151573480f5dec43ca2ce80656889a8f\"" Jul 2 07:54:37.980176 env[1190]: time="2024-07-02T07:54:37.980128031Z" level=info msg="StartContainer for \"83740fc52d43c22c4e129c824b178f78151573480f5dec43ca2ce80656889a8f\"" Jul 2 07:54:37.995837 env[1190]: time="2024-07-02T07:54:37.995731888Z" level=info msg="CreateContainer within sandbox \"560914c15bc314722e5a4a971249507a3a9bfefe480e012133ee4126e103d5fb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6223d8d50b90a7c900133307b2203cb2ed22f8f90eca50959963003d957aaf26\"" Jul 2 07:54:37.997127 env[1190]: time="2024-07-02T07:54:37.997079572Z" level=info msg="StartContainer for \"6223d8d50b90a7c900133307b2203cb2ed22f8f90eca50959963003d957aaf26\"" Jul 2 07:54:38.007520 systemd[1]: Started cri-containerd-83740fc52d43c22c4e129c824b178f78151573480f5dec43ca2ce80656889a8f.scope. Jul 2 07:54:38.018333 systemd[1]: Started cri-containerd-d4f9c2d633cfc9e30f8855befae52a68048b2a90fc6363e6f5861ea81173d6c1.scope. Jul 2 07:54:38.036229 systemd[1]: Started cri-containerd-6223d8d50b90a7c900133307b2203cb2ed22f8f90eca50959963003d957aaf26.scope. Jul 2 07:54:38.056101 kubelet[1682]: E0702 07:54:38.056009 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.188.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-4df693d906?timeout=10s\": dial tcp 137.184.188.4:6443: connect: connection refused" interval="1.6s" Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.072759 kernel: kauditd_printk_skb: 390 callbacks suppressed Jul 2 07:54:38.072888 kernel: audit: type=1400 audit(1719906878.069:517): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.079965 kernel: audit: type=1400 audit(1719906878.069:518): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.090495 kernel: audit: type=1400 audit(1719906878.069:519): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.090683 kernel: audit: type=1400 audit(1719906878.069:520): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.102035 kernel: audit: type=1400 audit(1719906878.069:521): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.102212 kernel: audit: type=1400 audit(1719906878.069:522): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111523 kernel: audit: type=1400 audit(1719906878.069:523): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.119009 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:54:38.119199 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:54:38.119250 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.069000 audit: BPF prog-id=73 op=LOAD Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1732 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373430666335326434336332326334653132396338323462313738 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1732 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373430666335326434336332326334653132396338323462313738 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.070000 audit: BPF prog-id=74 op=LOAD Jul 2 07:54:38.070000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a06d0 items=0 ppid=1732 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373430666335326434336332326334653132396338323462313738 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit: BPF prog-id=75 op=LOAD Jul 2 07:54:38.078000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0718 items=0 ppid=1732 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373430666335326434336332326334653132396338323462313738 Jul 2 07:54:38.078000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:54:38.078000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.078000 audit: BPF prog-id=76 op=LOAD Jul 2 07:54:38.078000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0b28 items=0 ppid=1732 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373430666335326434336332326334653132396338323462313738 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.111000 audit: BPF prog-id=77 op=LOAD Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit: BPF prog-id=82 op=LOAD Jul 2 07:54:38.124000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002187c0 items=0 ppid=1722 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434663963326436333363666339653330663838353562656661653532 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.124000 audit: BPF prog-id=83 op=LOAD Jul 2 07:54:38.124000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000218808 items=0 ppid=1722 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434663963326436333363666339653330663838353562656661653532 Jul 2 07:54:38.128000 audit: BPF prog-id=83 op=UNLOAD Jul 2 07:54:38.128000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.128000 audit: BPF prog-id=84 op=LOAD Jul 2 07:54:38.128000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000218c18 items=0 ppid=1722 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434663963326436333363666339653330663838353562656661653532 Jul 2 07:54:38.163354 kubelet[1682]: I0702 07:54:38.162816 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:38.163354 kubelet[1682]: E0702 07:54:38.163282 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://137.184.188.4:6443/api/v1/nodes\": dial tcp 137.184.188.4:6443: connect: connection refused" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:38.199346 env[1190]: time="2024-07-02T07:54:38.197950705Z" level=info msg="StartContainer for \"83740fc52d43c22c4e129c824b178f78151573480f5dec43ca2ce80656889a8f\" returns successfully" Jul 2 07:54:38.200959 env[1190]: time="2024-07-02T07:54:38.200900763Z" level=info msg="StartContainer for \"6223d8d50b90a7c900133307b2203cb2ed22f8f90eca50959963003d957aaf26\" returns successfully" Jul 2 07:54:38.202360 env[1190]: time="2024-07-02T07:54:38.202307339Z" level=info msg="StartContainer for \"d4f9c2d633cfc9e30f8855befae52a68048b2a90fc6363e6f5861ea81173d6c1\" returns successfully" Jul 2 07:54:38.708183 kubelet[1682]: E0702 07:54:38.708143 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:38.710619 kubelet[1682]: E0702 07:54:38.710586 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:38.712980 kubelet[1682]: E0702 07:54:38.712948 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:39.294000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:39.294000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000db050 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:39.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:39.295000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:39.295000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d6a2e0 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:39.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:39.715497 kubelet[1682]: E0702 07:54:39.715459 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:39.765182 kubelet[1682]: I0702 07:54:39.765148 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:40.479000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.479000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003d8f230 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.479000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.479000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004d65c20 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.479000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.479000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003d8f5c0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.485000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.485000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c004a60060 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.488000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.488000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c003d8fe30 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.488000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.490000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.490000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00516dcb0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:54:40.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:40.560110 kubelet[1682]: E0702 07:54:40.560066 1682 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-4df693d906\" not found" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:40.633248 kubelet[1682]: I0702 07:54:40.633196 1682 apiserver.go:52] "Watching apiserver" Jul 2 07:54:40.651727 kubelet[1682]: I0702 07:54:40.651569 1682 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:54:40.744156 kubelet[1682]: I0702 07:54:40.744014 1682 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:43.154613 systemd[1]: Reloading. Jul 2 07:54:43.252529 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-07-02T07:54:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:43.253319 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-07-02T07:54:43Z" level=info msg="torcx already run" Jul 2 07:54:43.351137 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:43.351162 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:43.372556 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:43.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.457516 kernel: kauditd_printk_skb: 269 callbacks suppressed Jul 2 07:54:43.457618 kernel: audit: type=1400 audit(1719906883.454:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464841 kernel: audit: type=1400 audit(1719906883.454:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.472906 kernel: audit: type=1400 audit(1719906883.463:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.473009 kernel: audit: type=1400 audit(1719906883.463:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.476737 kernel: audit: type=1400 audit(1719906883.463:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.481083 kernel: audit: type=1400 audit(1719906883.463:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.486063 kernel: audit: type=1400 audit(1719906883.463:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.493609 kernel: audit: type=1400 audit(1719906883.463:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.493722 kernel: audit: type=1400 audit(1719906883.463:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.493748 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.463000 audit: BPF prog-id=85 op=LOAD Jul 2 07:54:43.463000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.467000 audit: BPF prog-id=86 op=LOAD Jul 2 07:54:43.467000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:54:43.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit: BPF prog-id=87 op=LOAD Jul 2 07:54:43.471000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.475000 audit: BPF prog-id=88 op=LOAD Jul 2 07:54:43.475000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.488000 audit: BPF prog-id=89 op=LOAD Jul 2 07:54:43.488000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit: BPF prog-id=90 op=LOAD Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit: BPF prog-id=91 op=LOAD Jul 2 07:54:43.494000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:54:43.494000 audit: BPF prog-id=48 op=UNLOAD Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit: BPF prog-id=92 op=LOAD Jul 2 07:54:43.495000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit: BPF prog-id=93 op=LOAD Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.495000 audit: BPF prog-id=94 op=LOAD Jul 2 07:54:43.495000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:54:43.495000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.496000 audit: BPF prog-id=95 op=LOAD Jul 2 07:54:43.496000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.498000 audit: BPF prog-id=96 op=LOAD Jul 2 07:54:43.498000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit: BPF prog-id=97 op=LOAD Jul 2 07:54:43.500000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit: BPF prog-id=98 op=LOAD Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.500000 audit: BPF prog-id=99 op=LOAD Jul 2 07:54:43.500000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:54:43.500000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit: BPF prog-id=100 op=LOAD Jul 2 07:54:43.501000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.501000 audit: BPF prog-id=101 op=LOAD Jul 2 07:54:43.501000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.503000 audit: BPF prog-id=102 op=LOAD Jul 2 07:54:43.503000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit: BPF prog-id=103 op=LOAD Jul 2 07:54:43.504000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit: BPF prog-id=104 op=LOAD Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.504000 audit: BPF prog-id=105 op=LOAD Jul 2 07:54:43.504000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:54:43.504000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:54:43.521752 systemd[1]: Stopping kubelet.service... Jul 2 07:54:43.542967 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:54:43.543447 systemd[1]: Stopped kubelet.service. Jul 2 07:54:43.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:43.543666 systemd[1]: kubelet.service: Consumed 1.339s CPU time. Jul 2 07:54:43.547501 systemd[1]: Starting kubelet.service... Jul 2 07:54:44.455694 systemd[1]: Started kubelet.service. Jul 2 07:54:44.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:44.579985 kubelet[2021]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:44.580540 kubelet[2021]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:54:44.580604 kubelet[2021]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:44.580774 kubelet[2021]: I0702 07:54:44.580734 2021 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:54:44.604135 kubelet[2021]: I0702 07:54:44.604077 2021 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:54:44.604497 kubelet[2021]: I0702 07:54:44.604470 2021 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:54:44.604875 kubelet[2021]: I0702 07:54:44.604857 2021 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:54:44.606632 kubelet[2021]: I0702 07:54:44.606593 2021 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:54:44.622148 kubelet[2021]: I0702 07:54:44.622073 2021 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:54:44.636103 kubelet[2021]: I0702 07:54:44.636050 2021 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:54:44.636740 kubelet[2021]: I0702 07:54:44.636704 2021 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:54:44.637081 kubelet[2021]: I0702 07:54:44.636859 2021 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-4df693d906","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:54:44.637274 kubelet[2021]: I0702 07:54:44.637259 2021 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:54:44.637351 kubelet[2021]: I0702 07:54:44.637340 2021 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:54:44.637480 kubelet[2021]: I0702 07:54:44.637467 2021 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:44.637682 kubelet[2021]: I0702 07:54:44.637668 2021 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:54:44.638267 kubelet[2021]: I0702 07:54:44.638250 2021 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:54:44.638400 kubelet[2021]: I0702 07:54:44.638391 2021 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:54:44.644644 kubelet[2021]: I0702 07:54:44.644601 2021 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:54:44.646036 kubelet[2021]: I0702 07:54:44.645995 2021 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:54:44.646657 kubelet[2021]: I0702 07:54:44.646635 2021 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:54:44.653892 kubelet[2021]: I0702 07:54:44.653850 2021 server.go:1264] "Started kubelet" Jul 2 07:54:44.660000 audit[2021]: AVC avc: denied { mac_admin } for pid=2021 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.660000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:44.660000 audit[2021]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb5b90 a1=c000c68390 a2=c000bb5b60 a3=25 items=0 ppid=1 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:44.660000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:44.664692 kubelet[2021]: I0702 07:54:44.664437 2021 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:54:44.663000 audit[2021]: AVC avc: denied { mac_admin } for pid=2021 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.663000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:44.663000 audit[2021]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc3800 a1=c000c683a8 a2=c000bb5c20 a3=25 items=0 ppid=1 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:44.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:44.665684 kubelet[2021]: I0702 07:54:44.665649 2021 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:54:44.666067 kubelet[2021]: I0702 07:54:44.666023 2021 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:54:44.684729 kubelet[2021]: I0702 07:54:44.684671 2021 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:54:44.692940 kubelet[2021]: I0702 07:54:44.692898 2021 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:54:44.708891 kubelet[2021]: I0702 07:54:44.707529 2021 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:54:44.721035 kubelet[2021]: I0702 07:54:44.721003 2021 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:54:44.721246 kubelet[2021]: I0702 07:54:44.716903 2021 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:54:44.721320 kubelet[2021]: I0702 07:54:44.716887 2021 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:54:44.721697 kubelet[2021]: I0702 07:54:44.721675 2021 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:54:44.726784 kubelet[2021]: E0702 07:54:44.726754 2021 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:54:44.728828 kubelet[2021]: I0702 07:54:44.727367 2021 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:54:44.729047 kubelet[2021]: I0702 07:54:44.729030 2021 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:54:44.729450 kubelet[2021]: I0702 07:54:44.729335 2021 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:54:44.769512 kubelet[2021]: I0702 07:54:44.769473 2021 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:54:44.781274 kubelet[2021]: I0702 07:54:44.781235 2021 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:54:44.781600 kubelet[2021]: I0702 07:54:44.781573 2021 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:54:44.783046 kubelet[2021]: I0702 07:54:44.783021 2021 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:54:44.783281 kubelet[2021]: E0702 07:54:44.783260 2021 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.826938 2021 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827257 2021 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827265 2021 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827301 2021 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827571 2021 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827599 2021 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:54:44.827813 kubelet[2021]: I0702 07:54:44.827619 2021 policy_none.go:49] "None policy: Start" Jul 2 07:54:44.838616 kubelet[2021]: I0702 07:54:44.838586 2021 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:54:44.838829 kubelet[2021]: I0702 07:54:44.838818 2021 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:54:44.839062 kubelet[2021]: I0702 07:54:44.839048 2021 state_mem.go:75] "Updated machine memory state" Jul 2 07:54:44.849274 kubelet[2021]: I0702 07:54:44.849234 2021 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:44.850348 kubelet[2021]: I0702 07:54:44.850329 2021 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-4df693d906" Jul 2 07:54:44.881000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.881000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f135a0 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:44.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:44.882000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.882000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e59900 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:44.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:44.883000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.883000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e59ac0 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:44.883000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:44.886000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.886000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e59c80 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:44.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:44.891310 kubelet[2021]: E0702 07:54:44.891266 2021 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 07:54:44.893186 kubelet[2021]: I0702 07:54:44.893163 2021 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:54:44.892000 audit[2021]: AVC avc: denied { mac_admin } for pid=2021 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.892000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:44.892000 audit[2021]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00111af30 a1=c001116d80 a2=c00111af00 a3=25 items=0 ppid=1 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:44.892000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:44.894307 kubelet[2021]: I0702 07:54:44.894283 2021 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:54:44.896660 kubelet[2021]: I0702 07:54:44.896606 2021 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:54:44.904485 kubelet[2021]: I0702 07:54:44.904457 2021 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:54:44.919000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:54:44.919000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005f5780 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:54:44.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:45.093074 kubelet[2021]: I0702 07:54:45.093003 2021 topology_manager.go:215] "Topology Admit Handler" podUID="89ee6d44ac99b5fdd2b38264ed25ae05" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.093794 kubelet[2021]: I0702 07:54:45.093412 2021 topology_manager.go:215] "Topology Admit Handler" podUID="36389e796e60f72dc65abf2b58adc8c0" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.093980 kubelet[2021]: I0702 07:54:45.093964 2021 topology_manager.go:215] "Topology Admit Handler" podUID="ef54703895bfc1841ec958b79e4d9477" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.118690 kubelet[2021]: W0702 07:54:45.118649 2021 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:54:45.120850 kubelet[2021]: W0702 07:54:45.120806 2021 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:54:45.121437 kubelet[2021]: W0702 07:54:45.121396 2021 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:54:45.126436 kubelet[2021]: I0702 07:54:45.126366 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126436 kubelet[2021]: I0702 07:54:45.126412 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126655 kubelet[2021]: I0702 07:54:45.126458 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126655 kubelet[2021]: I0702 07:54:45.126479 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/89ee6d44ac99b5fdd2b38264ed25ae05-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-4df693d906\" (UID: \"89ee6d44ac99b5fdd2b38264ed25ae05\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126655 kubelet[2021]: I0702 07:54:45.126497 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/36389e796e60f72dc65abf2b58adc8c0-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-4df693d906\" (UID: \"36389e796e60f72dc65abf2b58adc8c0\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126655 kubelet[2021]: I0702 07:54:45.126513 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126655 kubelet[2021]: I0702 07:54:45.126531 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126818 kubelet[2021]: I0702 07:54:45.126563 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.126818 kubelet[2021]: I0702 07:54:45.126590 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ef54703895bfc1841ec958b79e4d9477-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-4df693d906\" (UID: \"ef54703895bfc1841ec958b79e4d9477\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.421055 kubelet[2021]: E0702 07:54:45.420477 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.421764 kubelet[2021]: E0702 07:54:45.421729 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.422705 kubelet[2021]: E0702 07:54:45.422669 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.645949 kubelet[2021]: I0702 07:54:45.645899 2021 apiserver.go:52] "Watching apiserver" Jul 2 07:54:45.721893 kubelet[2021]: I0702 07:54:45.721754 2021 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:54:45.860593 kubelet[2021]: E0702 07:54:45.860557 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.917327 kubelet[2021]: W0702 07:54:45.917275 2021 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:54:45.917650 kubelet[2021]: E0702 07:54:45.917615 2021 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-4df693d906\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.918371 kubelet[2021]: E0702 07:54:45.918341 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.919247 kubelet[2021]: W0702 07:54:45.919010 2021 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:54:45.919533 kubelet[2021]: E0702 07:54:45.919515 2021 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.5-a-4df693d906\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.5-a-4df693d906" Jul 2 07:54:45.919946 kubelet[2021]: E0702 07:54:45.919917 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:45.977230 kubelet[2021]: I0702 07:54:45.977081 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-4df693d906" podStartSLOduration=0.97706042 podStartE2EDuration="977.06042ms" podCreationTimestamp="2024-07-02 07:54:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:45.976769593 +0000 UTC m=+1.494065392" watchObservedRunningTime="2024-07-02 07:54:45.97706042 +0000 UTC m=+1.494356215" Jul 2 07:54:46.122995 kubelet[2021]: I0702 07:54:46.122926 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-4df693d906" podStartSLOduration=1.1228914620000001 podStartE2EDuration="1.122891462s" podCreationTimestamp="2024-07-02 07:54:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:46.122874071 +0000 UTC m=+1.640169875" watchObservedRunningTime="2024-07-02 07:54:46.122891462 +0000 UTC m=+1.640187255" Jul 2 07:54:46.123594 kubelet[2021]: I0702 07:54:46.123531 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-4df693d906" podStartSLOduration=1.123517147 podStartE2EDuration="1.123517147s" podCreationTimestamp="2024-07-02 07:54:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:46.086226536 +0000 UTC m=+1.603522351" watchObservedRunningTime="2024-07-02 07:54:46.123517147 +0000 UTC m=+1.640812943" Jul 2 07:54:46.862250 kubelet[2021]: E0702 07:54:46.862207 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:46.863841 kubelet[2021]: E0702 07:54:46.863810 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:48.922718 kubelet[2021]: E0702 07:54:48.922649 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:49.867831 kubelet[2021]: E0702 07:54:49.867782 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:50.266301 sudo[1328]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:50.265000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.268797 kernel: kauditd_printk_skb: 265 callbacks suppressed Jul 2 07:54:50.268961 kernel: audit: type=1106 audit(1719906890.265:812): pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.265000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.276802 sshd[1324]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:50.273000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.281301 systemd-logind[1180]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:54:50.283881 systemd[1]: sshd@6-137.184.188.4:22-147.75.109.163:50174.service: Deactivated successfully. Jul 2 07:54:50.284880 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:54:50.285048 systemd[1]: session-7.scope: Consumed 5.748s CPU time. Jul 2 07:54:50.287672 kernel: audit: type=1104 audit(1719906890.265:813): pid=1328 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.287843 kernel: audit: type=1106 audit(1719906890.273:814): pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.287892 kernel: audit: type=1104 audit(1719906890.273:815): pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.273000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.287149 systemd-logind[1180]: Removed session 7. Jul 2 07:54:50.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.188.4:22-147.75.109.163:50174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.299814 kernel: audit: type=1131 audit(1719906890.278:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.188.4:22-147.75.109.163:50174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.024979 kubelet[2021]: E0702 07:54:51.024933 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:51.633223 kubelet[2021]: E0702 07:54:51.633159 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:51.871789 kubelet[2021]: E0702 07:54:51.871741 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:51.872642 kubelet[2021]: E0702 07:54:51.872609 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:54:55.618337 update_engine[1181]: I0702 07:54:55.618202 1181 update_attempter.cc:509] Updating boot flags... Jul 2 07:54:59.377889 kubelet[2021]: I0702 07:54:59.377840 2021 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:54:59.379257 env[1190]: time="2024-07-02T07:54:59.379202643Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:54:59.380106 kubelet[2021]: I0702 07:54:59.380060 2021 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:54:59.534317 kubelet[2021]: I0702 07:54:59.534241 2021 topology_manager.go:215] "Topology Admit Handler" podUID="a675cd9b-bc8b-4961-8b89-fd9adc3e73d5" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-fkh7t" Jul 2 07:54:59.541783 systemd[1]: Created slice kubepods-besteffort-poda675cd9b_bc8b_4961_8b89_fd9adc3e73d5.slice. Jul 2 07:54:59.544432 kubelet[2021]: I0702 07:54:59.544364 2021 topology_manager.go:215] "Topology Admit Handler" podUID="6477030e-1a0e-40b5-bc28-52aad29ce964" podNamespace="kube-system" podName="kube-proxy-8mw5w" Jul 2 07:54:59.554910 systemd[1]: Created slice kubepods-besteffort-pod6477030e_1a0e_40b5_bc28_52aad29ce964.slice. Jul 2 07:54:59.575751 kubelet[2021]: W0702 07:54:59.575688 2021 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.576003 kubelet[2021]: E0702 07:54:59.575985 2021 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.576170 kubelet[2021]: W0702 07:54:59.576138 2021 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.576298 kubelet[2021]: E0702 07:54:59.576281 2021 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.576848 kubelet[2021]: W0702 07:54:59.576818 2021 reflector.go:547] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.577089 kubelet[2021]: E0702 07:54:59.577068 2021 reflector.go:150] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.577475 kubelet[2021]: W0702 07:54:59.577459 2021 reflector.go:547] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.577598 kubelet[2021]: E0702 07:54:59.577586 2021 reflector.go:150] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-4df693d906" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-4df693d906' and this object Jul 2 07:54:59.719641 kubelet[2021]: I0702 07:54:59.719390 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2cjn\" (UniqueName: \"kubernetes.io/projected/a675cd9b-bc8b-4961-8b89-fd9adc3e73d5-kube-api-access-b2cjn\") pod \"tigera-operator-76ff79f7fd-fkh7t\" (UID: \"a675cd9b-bc8b-4961-8b89-fd9adc3e73d5\") " pod="tigera-operator/tigera-operator-76ff79f7fd-fkh7t" Jul 2 07:54:59.719959 kubelet[2021]: I0702 07:54:59.719895 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6477030e-1a0e-40b5-bc28-52aad29ce964-kube-proxy\") pod \"kube-proxy-8mw5w\" (UID: \"6477030e-1a0e-40b5-bc28-52aad29ce964\") " pod="kube-system/kube-proxy-8mw5w" Jul 2 07:54:59.720103 kubelet[2021]: I0702 07:54:59.720074 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6477030e-1a0e-40b5-bc28-52aad29ce964-lib-modules\") pod \"kube-proxy-8mw5w\" (UID: \"6477030e-1a0e-40b5-bc28-52aad29ce964\") " pod="kube-system/kube-proxy-8mw5w" Jul 2 07:54:59.720253 kubelet[2021]: I0702 07:54:59.720224 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6477030e-1a0e-40b5-bc28-52aad29ce964-xtables-lock\") pod \"kube-proxy-8mw5w\" (UID: \"6477030e-1a0e-40b5-bc28-52aad29ce964\") " pod="kube-system/kube-proxy-8mw5w" Jul 2 07:54:59.720477 kubelet[2021]: I0702 07:54:59.720455 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ql452\" (UniqueName: \"kubernetes.io/projected/6477030e-1a0e-40b5-bc28-52aad29ce964-kube-api-access-ql452\") pod \"kube-proxy-8mw5w\" (UID: \"6477030e-1a0e-40b5-bc28-52aad29ce964\") " pod="kube-system/kube-proxy-8mw5w" Jul 2 07:54:59.720712 kubelet[2021]: I0702 07:54:59.720641 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a675cd9b-bc8b-4961-8b89-fd9adc3e73d5-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-fkh7t\" (UID: \"a675cd9b-bc8b-4961-8b89-fd9adc3e73d5\") " pod="tigera-operator/tigera-operator-76ff79f7fd-fkh7t" Jul 2 07:55:00.751807 env[1190]: time="2024-07-02T07:55:00.751666628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-fkh7t,Uid:a675cd9b-bc8b-4961-8b89-fd9adc3e73d5,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:55:00.800098 env[1190]: time="2024-07-02T07:55:00.799915007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:00.800098 env[1190]: time="2024-07-02T07:55:00.799983927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:00.800098 env[1190]: time="2024-07-02T07:55:00.800005212Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:00.809511 env[1190]: time="2024-07-02T07:55:00.801022954Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b pid=2125 runtime=io.containerd.runc.v2 Jul 2 07:55:00.824457 kubelet[2021]: E0702 07:55:00.824337 2021 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:55:00.835428 kubelet[2021]: E0702 07:55:00.834912 2021 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/6477030e-1a0e-40b5-bc28-52aad29ce964-kube-proxy podName:6477030e-1a0e-40b5-bc28-52aad29ce964 nodeName:}" failed. No retries permitted until 2024-07-02 07:55:01.33484419 +0000 UTC m=+16.852139992 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/6477030e-1a0e-40b5-bc28-52aad29ce964-kube-proxy") pod "kube-proxy-8mw5w" (UID: "6477030e-1a0e-40b5-bc28-52aad29ce964") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:55:00.827236 systemd[1]: Started cri-containerd-f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b.scope. Jul 2 07:55:00.881730 kernel: audit: type=1400 audit(1719906900.871:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.882040 kernel: audit: type=1400 audit(1719906900.871:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.882096 kernel: audit: type=1400 audit(1719906900.871:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.895388 kernel: audit: type=1400 audit(1719906900.871:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.895694 kernel: audit: type=1400 audit(1719906900.871:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.907648 kernel: audit: type=1400 audit(1719906900.871:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.907793 kernel: audit: type=1400 audit(1719906900.871:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.912534 kernel: audit: type=1400 audit(1719906900.871:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.917481 kernel: audit: type=1400 audit(1719906900.871:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.922478 kernel: audit: type=1400 audit(1719906900.884:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.884000 audit: BPF prog-id=106 op=LOAD Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2125 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356437346632386463376532653634383839323735623936653465 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2125 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356437346632386463376532653634383839323735623936653465 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.890000 audit: BPF prog-id=107 op=LOAD Jul 2 07:55:00.890000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002dc6d0 items=0 ppid=2125 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356437346632386463376532653634383839323735623936653465 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit: BPF prog-id=108 op=LOAD Jul 2 07:55:00.894000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002dc718 items=0 ppid=2125 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356437346632386463376532653634383839323735623936653465 Jul 2 07:55:00.894000 audit: BPF prog-id=108 op=UNLOAD Jul 2 07:55:00.894000 audit: BPF prog-id=107 op=UNLOAD Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.894000 audit: BPF prog-id=109 op=LOAD Jul 2 07:55:00.894000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002dcb28 items=0 ppid=2125 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356437346632386463376532653634383839323735623936653465 Jul 2 07:55:00.969315 env[1190]: time="2024-07-02T07:55:00.969240127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-fkh7t,Uid:a675cd9b-bc8b-4961-8b89-fd9adc3e73d5,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b\"" Jul 2 07:55:00.990138 env[1190]: time="2024-07-02T07:55:00.987385953Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:55:01.361877 kubelet[2021]: E0702 07:55:01.361491 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:01.363612 env[1190]: time="2024-07-02T07:55:01.363535321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8mw5w,Uid:6477030e-1a0e-40b5-bc28-52aad29ce964,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:01.411682 env[1190]: time="2024-07-02T07:55:01.408944907Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:01.411682 env[1190]: time="2024-07-02T07:55:01.409013767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:01.411682 env[1190]: time="2024-07-02T07:55:01.409035509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:01.411682 env[1190]: time="2024-07-02T07:55:01.409227840Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2fa2de829d9f989bc049ccc93e11dc72b8d98539a2fb76ef18a787341f958ee2 pid=2164 runtime=io.containerd.runc.v2 Jul 2 07:55:01.466661 systemd[1]: Started cri-containerd-2fa2de829d9f989bc049ccc93e11dc72b8d98539a2fb76ef18a787341f958ee2.scope. Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.489000 audit: BPF prog-id=110 op=LOAD Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2164 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266613264653832396439663938396263303439636363393365313164 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2164 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266613264653832396439663938396263303439636363393365313164 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit: BPF prog-id=111 op=LOAD Jul 2 07:55:01.490000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024af90 items=0 ppid=2164 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266613264653832396439663938396263303439636363393365313164 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.490000 audit: BPF prog-id=112 op=LOAD Jul 2 07:55:01.490000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024afd8 items=0 ppid=2164 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266613264653832396439663938396263303439636363393365313164 Jul 2 07:55:01.491000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:55:01.491000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.491000 audit: BPF prog-id=113 op=LOAD Jul 2 07:55:01.491000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024b3e8 items=0 ppid=2164 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266613264653832396439663938396263303439636363393365313164 Jul 2 07:55:01.557251 env[1190]: time="2024-07-02T07:55:01.556996268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8mw5w,Uid:6477030e-1a0e-40b5-bc28-52aad29ce964,Namespace:kube-system,Attempt:0,} returns sandbox id \"2fa2de829d9f989bc049ccc93e11dc72b8d98539a2fb76ef18a787341f958ee2\"" Jul 2 07:55:01.561648 kubelet[2021]: E0702 07:55:01.558983 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:01.581318 env[1190]: time="2024-07-02T07:55:01.581225635Z" level=info msg="CreateContainer within sandbox \"2fa2de829d9f989bc049ccc93e11dc72b8d98539a2fb76ef18a787341f958ee2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:55:01.615892 systemd[1]: run-containerd-runc-k8s.io-f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b-runc.Kws4WX.mount: Deactivated successfully. Jul 2 07:55:01.660287 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2770384000.mount: Deactivated successfully. Jul 2 07:55:01.692373 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3980106347.mount: Deactivated successfully. Jul 2 07:55:01.714256 env[1190]: time="2024-07-02T07:55:01.711315667Z" level=info msg="CreateContainer within sandbox \"2fa2de829d9f989bc049ccc93e11dc72b8d98539a2fb76ef18a787341f958ee2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7f16aa4c7155d382bc9abd16856f0c476d4b780a8045d4cfc1a5a4d617892c5d\"" Jul 2 07:55:01.718880 env[1190]: time="2024-07-02T07:55:01.718814160Z" level=info msg="StartContainer for \"7f16aa4c7155d382bc9abd16856f0c476d4b780a8045d4cfc1a5a4d617892c5d\"" Jul 2 07:55:01.796703 systemd[1]: Started cri-containerd-7f16aa4c7155d382bc9abd16856f0c476d4b780a8045d4cfc1a5a4d617892c5d.scope. Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe666157628 items=0 ppid=2164 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313661613463373135356433383262633961626431363835366630 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.839000 audit: BPF prog-id=114 op=LOAD Jul 2 07:55:01.839000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00027abb8 items=0 ppid=2164 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313661613463373135356433383262633961626431363835366630 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.842000 audit: BPF prog-id=115 op=LOAD Jul 2 07:55:01.842000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00027ac08 items=0 ppid=2164 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313661613463373135356433383262633961626431363835366630 Jul 2 07:55:01.844000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:55:01.844000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.844000 audit: BPF prog-id=116 op=LOAD Jul 2 07:55:01.844000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00027ac98 items=0 ppid=2164 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313661613463373135356433383262633961626431363835366630 Jul 2 07:55:01.907987 env[1190]: time="2024-07-02T07:55:01.906652263Z" level=info msg="StartContainer for \"7f16aa4c7155d382bc9abd16856f0c476d4b780a8045d4cfc1a5a4d617892c5d\" returns successfully" Jul 2 07:55:02.396000 audit[2252]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.396000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff540f1360 a2=0 a3=7fff540f134c items=0 ppid=2212 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:02.398000 audit[2253]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.398000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc26d3c750 a2=0 a3=7ffc26d3c73c items=0 ppid=2212 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:02.403000 audit[2254]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.403000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff42222d50 a2=0 a3=7fff42222d3c items=0 ppid=2212 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:02.403000 audit[2255]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.403000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5f93f060 a2=0 a3=7ffc5f93f04c items=0 ppid=2212 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:02.409000 audit[2256]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.409000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb142de60 a2=0 a3=7ffdb142de4c items=0 ppid=2212 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:02.414000 audit[2257]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.414000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb0b88970 a2=0 a3=7ffeb0b8895c items=0 ppid=2212 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:02.544000 audit[2258]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.544000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9a70a4e0 a2=0 a3=7ffe9a70a4cc items=0 ppid=2212 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:02.583000 audit[2260]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.583000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd4d3a8fc0 a2=0 a3=7ffd4d3a8fac items=0 ppid=2212 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:55:02.599000 audit[2263]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.599000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff665d3280 a2=0 a3=7fff665d326c items=0 ppid=2212 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:55:02.601000 audit[2264]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.601000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff303c6a10 a2=0 a3=7fff303c69fc items=0 ppid=2212 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:02.616000 audit[2266]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.616000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebbefab00 a2=0 a3=7ffebbefaaec items=0 ppid=2212 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:02.628000 audit[2267]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.628000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee367d4e0 a2=0 a3=7ffee367d4cc items=0 ppid=2212 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:02.639000 audit[2269]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.639000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0136d340 a2=0 a3=7ffc0136d32c items=0 ppid=2212 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:02.653000 audit[2272]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.653000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd2414fb0 a2=0 a3=7ffdd2414f9c items=0 ppid=2212 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:55:02.658000 audit[2273]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.658000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4929a190 a2=0 a3=7ffe4929a17c items=0 ppid=2212 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:02.665000 audit[2275]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.665000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe54f72cf0 a2=0 a3=7ffe54f72cdc items=0 ppid=2212 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:02.669000 audit[2276]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.669000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd8db1f0 a2=0 a3=7ffcfd8db1dc items=0 ppid=2212 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:02.676000 audit[2278]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.676000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe525023d0 a2=0 a3=7ffe525023bc items=0 ppid=2212 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:02.685000 audit[2281]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.685000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff96c9e170 a2=0 a3=7fff96c9e15c items=0 ppid=2212 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:02.694000 audit[2284]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.694000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefb660870 a2=0 a3=7ffefb66085c items=0 ppid=2212 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:02.697000 audit[2285]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.697000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe21740a40 a2=0 a3=7ffe21740a2c items=0 ppid=2212 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:02.715000 audit[2287]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.715000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffe88926b0 a2=0 a3=7fffe889269c items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:02.723000 audit[2290]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.723000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc58072ff0 a2=0 a3=7ffc58072fdc items=0 ppid=2212 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:02.726000 audit[2291]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.726000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea7716df0 a2=0 a3=7ffea7716ddc items=0 ppid=2212 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:02.734000 audit[2293]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:02.734000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff8c8b5ee0 a2=0 a3=7fff8c8b5ecc items=0 ppid=2212 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:02.772664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3048829061.mount: Deactivated successfully. Jul 2 07:55:02.827000 audit[2299]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:02.827000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffce3f952d0 a2=0 a3=7ffce3f952bc items=0 ppid=2212 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:02.844000 audit[2299]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:02.844000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffce3f952d0 a2=0 a3=7ffce3f952bc items=0 ppid=2212 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:02.850000 audit[2304]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.850000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0f7edfe0 a2=0 a3=7ffd0f7edfcc items=0 ppid=2212 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:02.860000 audit[2306]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.860000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda7968fb0 a2=0 a3=7ffda7968f9c items=0 ppid=2212 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:55:02.871000 audit[2309]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.871000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff50841d60 a2=0 a3=7fff50841d4c items=0 ppid=2212 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:55:02.876000 audit[2310]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.876000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5fc16a10 a2=0 a3=7fff5fc169fc items=0 ppid=2212 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:02.898000 audit[2312]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.898000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8be66ec0 a2=0 a3=7ffc8be66eac items=0 ppid=2212 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:02.902000 audit[2313]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.902000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc471abd50 a2=0 a3=7ffc471abd3c items=0 ppid=2212 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:02.910000 audit[2315]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.910000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff58aaab10 a2=0 a3=7fff58aaaafc items=0 ppid=2212 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:55:02.921928 kubelet[2021]: E0702 07:55:02.920788 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:02.938000 audit[2318]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.938000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff94606c80 a2=0 a3=7fff94606c6c items=0 ppid=2212 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:02.944000 audit[2319]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.944000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7e7b31a0 a2=0 a3=7ffc7e7b318c items=0 ppid=2212 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:02.950000 audit[2321]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.950000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccca618f0 a2=0 a3=7ffccca618dc items=0 ppid=2212 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:02.953000 audit[2322]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.953000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe29f4a0b0 a2=0 a3=7ffe29f4a09c items=0 ppid=2212 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:02.963502 kubelet[2021]: I0702 07:55:02.963387 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8mw5w" podStartSLOduration=3.963360083 podStartE2EDuration="3.963360083s" podCreationTimestamp="2024-07-02 07:54:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:02.962712133 +0000 UTC m=+18.480007988" watchObservedRunningTime="2024-07-02 07:55:02.963360083 +0000 UTC m=+18.480655883" Jul 2 07:55:02.973000 audit[2324]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.973000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca14b7430 a2=0 a3=7ffca14b741c items=0 ppid=2212 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:02.988000 audit[2327]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:02.988000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff84065460 a2=0 a3=7fff8406544c items=0 ppid=2212 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:03.016000 audit[2330]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.016000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb7f7f940 a2=0 a3=7ffdb7f7f92c items=0 ppid=2212 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:55:03.021000 audit[2331]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.021000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8d518350 a2=0 a3=7ffd8d51833c items=0 ppid=2212 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:03.032000 audit[2333]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.032000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef6a018e0 a2=0 a3=7ffef6a018cc items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:03.052000 audit[2336]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.052000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff3bf25a90 a2=0 a3=7fff3bf25a7c items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:03.060000 audit[2337]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.060000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc04731000 a2=0 a3=7ffc04730fec items=0 ppid=2212 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:03.074000 audit[2339]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.074000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdae7b2450 a2=0 a3=7ffdae7b243c items=0 ppid=2212 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:03.079000 audit[2340]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.079000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9eaa2d20 a2=0 a3=7ffd9eaa2d0c items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:03.095000 audit[2342]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.095000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf8c1c370 a2=0 a3=7ffdf8c1c35c items=0 ppid=2212 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:03.111000 audit[2345]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:03.111000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec1ac4c90 a2=0 a3=7ffec1ac4c7c items=0 ppid=2212 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:03.120000 audit[2347]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:03.120000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffec5551c20 a2=0 a3=7ffec5551c0c items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.120000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:03.122000 audit[2347]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:03.122000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffec5551c20 a2=0 a3=7ffec5551c0c items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.122000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:04.546120 env[1190]: time="2024-07-02T07:55:04.546055025Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:04.551375 env[1190]: time="2024-07-02T07:55:04.551292043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:04.555395 env[1190]: time="2024-07-02T07:55:04.555330057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:04.557642 env[1190]: time="2024-07-02T07:55:04.557580098Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:04.558805 env[1190]: time="2024-07-02T07:55:04.558750015Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:55:04.566918 env[1190]: time="2024-07-02T07:55:04.566854448Z" level=info msg="CreateContainer within sandbox \"f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:55:04.605040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount626383186.mount: Deactivated successfully. Jul 2 07:55:04.618637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2390792781.mount: Deactivated successfully. Jul 2 07:55:04.622487 env[1190]: time="2024-07-02T07:55:04.622360223Z" level=info msg="CreateContainer within sandbox \"f45d74f28dc7e2e64889275b96e4e06b0bfe0e7ae4b27bde5600ef0840561f7b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a1df7971be373ca97b49a6b8cba8eff38b4a89c4bd3ddba1cbb584362396eba8\"" Jul 2 07:55:04.626076 env[1190]: time="2024-07-02T07:55:04.625995409Z" level=info msg="StartContainer for \"a1df7971be373ca97b49a6b8cba8eff38b4a89c4bd3ddba1cbb584362396eba8\"" Jul 2 07:55:04.667024 systemd[1]: Started cri-containerd-a1df7971be373ca97b49a6b8cba8eff38b4a89c4bd3ddba1cbb584362396eba8.scope. Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.704000 audit: BPF prog-id=117 op=LOAD Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2125 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646637393731626533373363613937623439613662386362613865 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2125 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646637393731626533373363613937623439613662386362613865 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit: BPF prog-id=118 op=LOAD Jul 2 07:55:04.706000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000259d00 items=0 ppid=2125 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646637393731626533373363613937623439613662386362613865 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit: BPF prog-id=119 op=LOAD Jul 2 07:55:04.706000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000259d48 items=0 ppid=2125 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646637393731626533373363613937623439613662386362613865 Jul 2 07:55:04.706000 audit: BPF prog-id=119 op=UNLOAD Jul 2 07:55:04.706000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:04.706000 audit: BPF prog-id=120 op=LOAD Jul 2 07:55:04.706000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be158 items=0 ppid=2125 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646637393731626533373363613937623439613662386362613865 Jul 2 07:55:04.743295 env[1190]: time="2024-07-02T07:55:04.743218808Z" level=info msg="StartContainer for \"a1df7971be373ca97b49a6b8cba8eff38b4a89c4bd3ddba1cbb584362396eba8\" returns successfully" Jul 2 07:55:07.977000 audit[2389]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:07.980890 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 2 07:55:07.981065 kernel: audit: type=1325 audit(1719906907.977:928): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:07.977000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc86c9d910 a2=0 a3=7ffc86c9d8fc items=0 ppid=2212 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.991872 kernel: audit: type=1300 audit(1719906907.977:928): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc86c9d910 a2=0 a3=7ffc86c9d8fc items=0 ppid=2212 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:08.005537 kernel: audit: type=1327 audit(1719906907.977:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:07.979000 audit[2389]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:07.979000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc86c9d910 a2=0 a3=0 items=0 ppid=2212 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.018926 kernel: audit: type=1325 audit(1719906907.979:929): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:08.019143 kernel: audit: type=1300 audit(1719906907.979:929): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc86c9d910 a2=0 a3=0 items=0 ppid=2212 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.019211 kernel: audit: type=1327 audit(1719906907.979:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:07.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:08.026000 audit[2391]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:08.026000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe33f36290 a2=0 a3=7ffe33f3627c items=0 ppid=2212 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.038775 kernel: audit: type=1325 audit(1719906908.026:930): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:08.038992 kernel: audit: type=1300 audit(1719906908.026:930): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe33f36290 a2=0 a3=7ffe33f3627c items=0 ppid=2212 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.039045 kernel: audit: type=1327 audit(1719906908.026:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:08.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:08.039000 audit[2391]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:08.039000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe33f36290 a2=0 a3=0 items=0 ppid=2212 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:08.050462 kernel: audit: type=1325 audit(1719906908.039:931): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:08.157612 kubelet[2021]: I0702 07:55:08.157517 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-fkh7t" podStartSLOduration=5.5780076 podStartE2EDuration="9.157488764s" podCreationTimestamp="2024-07-02 07:54:59 +0000 UTC" firstStartedPulling="2024-07-02 07:55:00.982742586 +0000 UTC m=+16.500038358" lastFinishedPulling="2024-07-02 07:55:04.562223719 +0000 UTC m=+20.079519522" observedRunningTime="2024-07-02 07:55:04.943623475 +0000 UTC m=+20.460919280" watchObservedRunningTime="2024-07-02 07:55:08.157488764 +0000 UTC m=+23.674784574" Jul 2 07:55:08.158348 kubelet[2021]: I0702 07:55:08.157737 2021 topology_manager.go:215] "Topology Admit Handler" podUID="59e4616a-75f5-40ee-ae01-e45d9f85dc8f" podNamespace="calico-system" podName="calico-typha-6974bddb77-qngcg" Jul 2 07:55:08.165344 systemd[1]: Created slice kubepods-besteffort-pod59e4616a_75f5_40ee_ae01_e45d9f85dc8f.slice. Jul 2 07:55:08.283237 kubelet[2021]: I0702 07:55:08.283072 2021 topology_manager.go:215] "Topology Admit Handler" podUID="b5dd44b3-e818-4f64-88bf-e682ae727163" podNamespace="calico-system" podName="calico-node-6bncx" Jul 2 07:55:08.291246 systemd[1]: Created slice kubepods-besteffort-podb5dd44b3_e818_4f64_88bf_e682ae727163.slice. Jul 2 07:55:08.308079 kubelet[2021]: I0702 07:55:08.307993 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/59e4616a-75f5-40ee-ae01-e45d9f85dc8f-typha-certs\") pod \"calico-typha-6974bddb77-qngcg\" (UID: \"59e4616a-75f5-40ee-ae01-e45d9f85dc8f\") " pod="calico-system/calico-typha-6974bddb77-qngcg" Jul 2 07:55:08.308079 kubelet[2021]: I0702 07:55:08.308093 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wpnb4\" (UniqueName: \"kubernetes.io/projected/59e4616a-75f5-40ee-ae01-e45d9f85dc8f-kube-api-access-wpnb4\") pod \"calico-typha-6974bddb77-qngcg\" (UID: \"59e4616a-75f5-40ee-ae01-e45d9f85dc8f\") " pod="calico-system/calico-typha-6974bddb77-qngcg" Jul 2 07:55:08.308519 kubelet[2021]: I0702 07:55:08.308174 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/59e4616a-75f5-40ee-ae01-e45d9f85dc8f-tigera-ca-bundle\") pod \"calico-typha-6974bddb77-qngcg\" (UID: \"59e4616a-75f5-40ee-ae01-e45d9f85dc8f\") " pod="calico-system/calico-typha-6974bddb77-qngcg" Jul 2 07:55:08.409584 kubelet[2021]: I0702 07:55:08.409517 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-lib-modules\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.409963 kubelet[2021]: I0702 07:55:08.409934 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-cni-bin-dir\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.410491 kubelet[2021]: I0702 07:55:08.410355 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-xtables-lock\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.410691 kubelet[2021]: I0702 07:55:08.410636 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-policysync\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.410816 kubelet[2021]: I0702 07:55:08.410800 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-cni-log-dir\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.410912 kubelet[2021]: I0702 07:55:08.410898 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-var-lib-calico\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.410989 kubelet[2021]: I0702 07:55:08.410975 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-cni-net-dir\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.411078 kubelet[2021]: I0702 07:55:08.411059 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-var-run-calico\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.411304 kubelet[2021]: I0702 07:55:08.411261 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b5dd44b3-e818-4f64-88bf-e682ae727163-flexvol-driver-host\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.411480 kubelet[2021]: I0702 07:55:08.411411 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b5dd44b3-e818-4f64-88bf-e682ae727163-node-certs\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.411539 kubelet[2021]: I0702 07:55:08.411514 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7zx45\" (UniqueName: \"kubernetes.io/projected/b5dd44b3-e818-4f64-88bf-e682ae727163-kube-api-access-7zx45\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.412153 kubelet[2021]: I0702 07:55:08.412105 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5dd44b3-e818-4f64-88bf-e682ae727163-tigera-ca-bundle\") pod \"calico-node-6bncx\" (UID: \"b5dd44b3-e818-4f64-88bf-e682ae727163\") " pod="calico-system/calico-node-6bncx" Jul 2 07:55:08.466358 kubelet[2021]: I0702 07:55:08.466292 2021 topology_manager.go:215] "Topology Admit Handler" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" podNamespace="calico-system" podName="csi-node-driver-285st" Jul 2 07:55:08.467349 kubelet[2021]: E0702 07:55:08.467315 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:08.468933 kubelet[2021]: E0702 07:55:08.468900 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:08.469530 env[1190]: time="2024-07-02T07:55:08.469485019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6974bddb77-qngcg,Uid:59e4616a-75f5-40ee-ae01-e45d9f85dc8f,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:08.501393 env[1190]: time="2024-07-02T07:55:08.501273274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:08.501611 env[1190]: time="2024-07-02T07:55:08.501404581Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:08.501611 env[1190]: time="2024-07-02T07:55:08.501474211Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:08.501993 env[1190]: time="2024-07-02T07:55:08.501926190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc4469adb77055cdf84438bb2fa998e35e74341eee42b1dc0fc8400b395ae27c pid=2401 runtime=io.containerd.runc.v2 Jul 2 07:55:08.512836 kubelet[2021]: I0702 07:55:08.512761 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/809a447d-7284-46e7-a8cf-14b6eb923d1e-kubelet-dir\") pod \"csi-node-driver-285st\" (UID: \"809a447d-7284-46e7-a8cf-14b6eb923d1e\") " pod="calico-system/csi-node-driver-285st" Jul 2 07:55:08.513074 kubelet[2021]: I0702 07:55:08.512880 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/809a447d-7284-46e7-a8cf-14b6eb923d1e-varrun\") pod \"csi-node-driver-285st\" (UID: \"809a447d-7284-46e7-a8cf-14b6eb923d1e\") " pod="calico-system/csi-node-driver-285st" Jul 2 07:55:08.513074 kubelet[2021]: I0702 07:55:08.512930 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/809a447d-7284-46e7-a8cf-14b6eb923d1e-socket-dir\") pod \"csi-node-driver-285st\" (UID: \"809a447d-7284-46e7-a8cf-14b6eb923d1e\") " pod="calico-system/csi-node-driver-285st" Jul 2 07:55:08.513074 kubelet[2021]: I0702 07:55:08.513001 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/809a447d-7284-46e7-a8cf-14b6eb923d1e-registration-dir\") pod \"csi-node-driver-285st\" (UID: \"809a447d-7284-46e7-a8cf-14b6eb923d1e\") " pod="calico-system/csi-node-driver-285st" Jul 2 07:55:08.513074 kubelet[2021]: I0702 07:55:08.513026 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dckt2\" (UniqueName: \"kubernetes.io/projected/809a447d-7284-46e7-a8cf-14b6eb923d1e-kube-api-access-dckt2\") pod \"csi-node-driver-285st\" (UID: \"809a447d-7284-46e7-a8cf-14b6eb923d1e\") " pod="calico-system/csi-node-driver-285st" Jul 2 07:55:08.514984 kubelet[2021]: E0702 07:55:08.514908 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.514984 kubelet[2021]: W0702 07:55:08.514937 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.514984 kubelet[2021]: E0702 07:55:08.514979 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.515207 kubelet[2021]: E0702 07:55:08.515192 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.515207 kubelet[2021]: W0702 07:55:08.515206 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.515292 kubelet[2021]: E0702 07:55:08.515216 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.517245 kubelet[2021]: E0702 07:55:08.517204 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.517245 kubelet[2021]: W0702 07:55:08.517234 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.517588 kubelet[2021]: E0702 07:55:08.517558 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.517747 kubelet[2021]: E0702 07:55:08.517635 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.517873 kubelet[2021]: W0702 07:55:08.517853 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.518023 kubelet[2021]: E0702 07:55:08.517987 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.518359 kubelet[2021]: E0702 07:55:08.518338 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.518514 kubelet[2021]: W0702 07:55:08.518494 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.518680 kubelet[2021]: E0702 07:55:08.518643 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.519038 kubelet[2021]: E0702 07:55:08.519021 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.519136 kubelet[2021]: W0702 07:55:08.519121 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.519301 kubelet[2021]: E0702 07:55:08.519264 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.519594 kubelet[2021]: E0702 07:55:08.519582 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.519816 kubelet[2021]: W0702 07:55:08.519781 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.519964 kubelet[2021]: E0702 07:55:08.519940 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.520233 kubelet[2021]: E0702 07:55:08.520220 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.520364 kubelet[2021]: W0702 07:55:08.520345 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.520525 kubelet[2021]: E0702 07:55:08.520506 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.520893 kubelet[2021]: E0702 07:55:08.520864 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.521010 kubelet[2021]: W0702 07:55:08.520995 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.521114 kubelet[2021]: E0702 07:55:08.521100 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.521451 kubelet[2021]: E0702 07:55:08.521434 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.521556 kubelet[2021]: W0702 07:55:08.521542 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.521657 kubelet[2021]: E0702 07:55:08.521640 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.522059 kubelet[2021]: E0702 07:55:08.522036 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.522215 kubelet[2021]: W0702 07:55:08.522192 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.522323 kubelet[2021]: E0702 07:55:08.522304 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.533073 kubelet[2021]: E0702 07:55:08.533039 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.535194 kubelet[2021]: W0702 07:55:08.533346 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.535545 kubelet[2021]: E0702 07:55:08.535514 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.554643 systemd[1]: Started cri-containerd-dc4469adb77055cdf84438bb2fa998e35e74341eee42b1dc0fc8400b395ae27c.scope. Jul 2 07:55:08.571306 kubelet[2021]: E0702 07:55:08.570782 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.571306 kubelet[2021]: W0702 07:55:08.570807 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.571306 kubelet[2021]: E0702 07:55:08.570828 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.595274 kubelet[2021]: E0702 07:55:08.595230 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:08.596394 env[1190]: time="2024-07-02T07:55:08.596242139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6bncx,Uid:b5dd44b3-e818-4f64-88bf-e682ae727163,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614156 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.614754 kubelet[2021]: W0702 07:55:08.614190 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614218 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614473 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.614754 kubelet[2021]: W0702 07:55:08.614482 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614492 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614632 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.614754 kubelet[2021]: W0702 07:55:08.614639 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.614754 kubelet[2021]: E0702 07:55:08.614647 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.614792 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.615315 kubelet[2021]: W0702 07:55:08.614800 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.614808 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.614946 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.615315 kubelet[2021]: W0702 07:55:08.614952 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.614959 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.615213 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.615315 kubelet[2021]: W0702 07:55:08.615226 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.615315 kubelet[2021]: E0702 07:55:08.615239 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.615684 kubelet[2021]: E0702 07:55:08.615430 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.615684 kubelet[2021]: W0702 07:55:08.615456 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.615684 kubelet[2021]: E0702 07:55:08.615466 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.615684 kubelet[2021]: E0702 07:55:08.615641 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.615684 kubelet[2021]: W0702 07:55:08.615648 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.615684 kubelet[2021]: E0702 07:55:08.615657 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616352 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.617856 kubelet[2021]: W0702 07:55:08.616376 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616394 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616710 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.617856 kubelet[2021]: W0702 07:55:08.616723 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616738 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616957 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.617856 kubelet[2021]: W0702 07:55:08.616970 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.616996 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.617856 kubelet[2021]: E0702 07:55:08.617230 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618287 kubelet[2021]: W0702 07:55:08.617239 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.617249 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.617710 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618287 kubelet[2021]: W0702 07:55:08.617726 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.617740 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.617915 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618287 kubelet[2021]: W0702 07:55:08.617925 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.617944 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.618287 kubelet[2021]: E0702 07:55:08.618158 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618287 kubelet[2021]: W0702 07:55:08.618169 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618683 kubelet[2021]: E0702 07:55:08.618187 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.618683 kubelet[2021]: E0702 07:55:08.618518 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618683 kubelet[2021]: W0702 07:55:08.618531 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618683 kubelet[2021]: E0702 07:55:08.618560 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.618826 kubelet[2021]: E0702 07:55:08.618767 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.618826 kubelet[2021]: W0702 07:55:08.618778 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.618826 kubelet[2021]: E0702 07:55:08.618795 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.619004 kubelet[2021]: E0702 07:55:08.618958 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.619004 kubelet[2021]: W0702 07:55:08.618977 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.619004 kubelet[2021]: E0702 07:55:08.618993 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619244 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.620921 kubelet[2021]: W0702 07:55:08.619261 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619346 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619511 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.620921 kubelet[2021]: W0702 07:55:08.619519 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619532 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619699 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.620921 kubelet[2021]: W0702 07:55:08.619707 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619717 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.620921 kubelet[2021]: E0702 07:55:08.619906 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.621377 kubelet[2021]: W0702 07:55:08.619914 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.619924 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.620118 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.621377 kubelet[2021]: W0702 07:55:08.620126 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.620135 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.620342 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.621377 kubelet[2021]: W0702 07:55:08.620355 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.620369 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.621377 kubelet[2021]: E0702 07:55:08.620650 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.621377 kubelet[2021]: W0702 07:55:08.620661 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.621724 kubelet[2021]: E0702 07:55:08.620671 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.625966 env[1190]: time="2024-07-02T07:55:08.625816128Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:08.625966 env[1190]: time="2024-07-02T07:55:08.625895885Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:08.625966 env[1190]: time="2024-07-02T07:55:08.625913909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:08.626714 env[1190]: time="2024-07-02T07:55:08.626494688Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27 pid=2450 runtime=io.containerd.runc.v2 Jul 2 07:55:08.648998 systemd[1]: Started cri-containerd-59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27.scope. Jul 2 07:55:08.661100 kubelet[2021]: E0702 07:55:08.661039 2021 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:08.661100 kubelet[2021]: W0702 07:55:08.661076 2021 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:08.661100 kubelet[2021]: E0702 07:55:08.661105 2021 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.694000 audit: BPF prog-id=121 op=LOAD Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2450 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623736343762383439316437306234313464373032373138363134 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2450 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623736343762383439316437306234313464373032373138363134 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit: BPF prog-id=122 op=LOAD Jul 2 07:55:08.695000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6a10 items=0 ppid=2450 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623736343762383439316437306234313464373032373138363134 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.695000 audit: BPF prog-id=123 op=LOAD Jul 2 07:55:08.695000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6a58 items=0 ppid=2450 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623736343762383439316437306234313464373032373138363134 Jul 2 07:55:08.696000 audit: BPF prog-id=123 op=UNLOAD Jul 2 07:55:08.696000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.696000 audit: BPF prog-id=124 op=LOAD Jul 2 07:55:08.696000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c6e68 items=0 ppid=2450 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623736343762383439316437306234313464373032373138363134 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.714000 audit: BPF prog-id=125 op=LOAD Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2401 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343436396164623737303535636466383434333862623266613939 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2401 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343436396164623737303535636466383434333862623266613939 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit: BPF prog-id=126 op=LOAD Jul 2 07:55:08.715000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000410220 items=0 ppid=2401 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343436396164623737303535636466383434333862623266613939 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit: BPF prog-id=127 op=LOAD Jul 2 07:55:08.715000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000410268 items=0 ppid=2401 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343436396164623737303535636466383434333862623266613939 Jul 2 07:55:08.715000 audit: BPF prog-id=127 op=UNLOAD Jul 2 07:55:08.715000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.715000 audit: BPF prog-id=128 op=LOAD Jul 2 07:55:08.715000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000410678 items=0 ppid=2401 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343436396164623737303535636466383434333862623266613939 Jul 2 07:55:08.723399 env[1190]: time="2024-07-02T07:55:08.723308339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6bncx,Uid:b5dd44b3-e818-4f64-88bf-e682ae727163,Namespace:calico-system,Attempt:0,} returns sandbox id \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\"" Jul 2 07:55:08.724608 kubelet[2021]: E0702 07:55:08.724568 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:08.726603 env[1190]: time="2024-07-02T07:55:08.726494629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:55:08.802002 env[1190]: time="2024-07-02T07:55:08.801781037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6974bddb77-qngcg,Uid:59e4616a-75f5-40ee-ae01-e45d9f85dc8f,Namespace:calico-system,Attempt:0,} returns sandbox id \"dc4469adb77055cdf84438bb2fa998e35e74341eee42b1dc0fc8400b395ae27c\"" Jul 2 07:55:08.808300 kubelet[2021]: E0702 07:55:08.807983 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:09.064000 audit[2517]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:09.064000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc1d967c0 a2=0 a3=7ffcc1d967ac items=0 ppid=2212 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:09.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:09.067000 audit[2517]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:09.067000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc1d967c0 a2=0 a3=0 items=0 ppid=2212 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:09.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:09.784539 kubelet[2021]: E0702 07:55:09.783900 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:10.340355 systemd[1]: Started sshd@7-137.184.188.4:22-79.110.62.145:30992.service. Jul 2 07:55:10.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.188.4:22-79.110.62.145:30992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:10.598253 env[1190]: time="2024-07-02T07:55:10.597910309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.600647 env[1190]: time="2024-07-02T07:55:10.600571692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.603047 env[1190]: time="2024-07-02T07:55:10.602989561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.619258 env[1190]: time="2024-07-02T07:55:10.619188683Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.620038 env[1190]: time="2024-07-02T07:55:10.619972501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:55:10.624450 env[1190]: time="2024-07-02T07:55:10.624291933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:55:10.625169 env[1190]: time="2024-07-02T07:55:10.625131706Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:55:10.657568 env[1190]: time="2024-07-02T07:55:10.657486911Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c\"" Jul 2 07:55:10.658339 env[1190]: time="2024-07-02T07:55:10.658293435Z" level=info msg="StartContainer for \"311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c\"" Jul 2 07:55:10.709490 systemd[1]: run-containerd-runc-k8s.io-311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c-runc.cMYkPL.mount: Deactivated successfully. Jul 2 07:55:10.720042 systemd[1]: Started cri-containerd-311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c.scope. Jul 2 07:55:10.775000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.775000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd470c27608 items=0 ppid=2450 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331316431366230653631666661336337303331323436346661353462 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.776000 audit: BPF prog-id=129 op=LOAD Jul 2 07:55:10.776000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002baf28 items=0 ppid=2450 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331316431366230653631666661336337303331323436346661353462 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.777000 audit: BPF prog-id=130 op=LOAD Jul 2 07:55:10.777000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002baf78 items=0 ppid=2450 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331316431366230653631666661336337303331323436346661353462 Jul 2 07:55:10.778000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:55:10.778000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:10.778000 audit: BPF prog-id=131 op=LOAD Jul 2 07:55:10.778000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002bb008 items=0 ppid=2450 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331316431366230653631666661336337303331323436346661353462 Jul 2 07:55:10.805791 env[1190]: time="2024-07-02T07:55:10.805735183Z" level=info msg="StartContainer for \"311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c\" returns successfully" Jul 2 07:55:10.825088 systemd[1]: cri-containerd-311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c.scope: Deactivated successfully. Jul 2 07:55:10.826000 audit: BPF prog-id=131 op=UNLOAD Jul 2 07:55:10.872023 env[1190]: time="2024-07-02T07:55:10.871865107Z" level=info msg="shim disconnected" id=311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c Jul 2 07:55:10.872622 env[1190]: time="2024-07-02T07:55:10.872572153Z" level=warning msg="cleaning up after shim disconnected" id=311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c namespace=k8s.io Jul 2 07:55:10.872815 env[1190]: time="2024-07-02T07:55:10.872789137Z" level=info msg="cleaning up dead shim" Jul 2 07:55:10.890301 env[1190]: time="2024-07-02T07:55:10.890238816Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2567 runtime=io.containerd.runc.v2\n" Jul 2 07:55:10.950788 kubelet[2021]: E0702 07:55:10.950569 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:11.323782 sshd[2519]: Invalid user user from 79.110.62.145 port 30992 Jul 2 07:55:11.329340 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:11.330475 sshd[2519]: pam_unix(sshd:auth): check pass; user unknown Jul 2 07:55:11.330542 sshd[2519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.62.145 Jul 2 07:55:11.331378 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:11.330000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=79.110.62.145 addr=79.110.62.145 terminal=ssh res=failed' Jul 2 07:55:11.650462 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-311d16b0e61ffa3c70312464fa54bb5960c2b22c83f3886da98a0bcb1c72682c-rootfs.mount: Deactivated successfully. Jul 2 07:55:11.784622 kubelet[2021]: E0702 07:55:11.784548 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:12.823995 sshd[2519]: Failed password for invalid user user from 79.110.62.145 port 30992 ssh2 Jul 2 07:55:13.629768 env[1190]: time="2024-07-02T07:55:13.629704131Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:13.633069 env[1190]: time="2024-07-02T07:55:13.633012857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:13.635896 env[1190]: time="2024-07-02T07:55:13.635849587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:13.638202 env[1190]: time="2024-07-02T07:55:13.638153712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:13.639104 env[1190]: time="2024-07-02T07:55:13.639055883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:55:13.642234 env[1190]: time="2024-07-02T07:55:13.642181176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:55:13.667436 env[1190]: time="2024-07-02T07:55:13.667363902Z" level=info msg="CreateContainer within sandbox \"dc4469adb77055cdf84438bb2fa998e35e74341eee42b1dc0fc8400b395ae27c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:55:13.690110 env[1190]: time="2024-07-02T07:55:13.690023718Z" level=info msg="CreateContainer within sandbox \"dc4469adb77055cdf84438bb2fa998e35e74341eee42b1dc0fc8400b395ae27c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b671945be62d4b6f8fe4e1e65506dc4ece7118b8ca749b523c3d6c7c16a70339\"" Jul 2 07:55:13.693690 env[1190]: time="2024-07-02T07:55:13.693619644Z" level=info msg="StartContainer for \"b671945be62d4b6f8fe4e1e65506dc4ece7118b8ca749b523c3d6c7c16a70339\"" Jul 2 07:55:13.741963 systemd[1]: Started cri-containerd-b671945be62d4b6f8fe4e1e65506dc4ece7118b8ca749b523c3d6c7c16a70339.scope. Jul 2 07:55:13.778962 kernel: kauditd_printk_skb: 168 callbacks suppressed Jul 2 07:55:13.779191 kernel: audit: type=1400 audit(1719906913.772:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.779259 kernel: audit: type=1400 audit(1719906913.772:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.784628 kubelet[2021]: E0702 07:55:13.784184 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:13.788613 kernel: audit: type=1400 audit(1719906913.772:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.794577 kernel: audit: type=1400 audit(1719906913.772:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.803529 kernel: audit: type=1400 audit(1719906913.772:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.812960 kernel: audit: type=1400 audit(1719906913.772:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.813150 kernel: audit: type=1400 audit(1719906913.772:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.819542 kernel: audit: type=1400 audit(1719906913.772:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.831064 kernel: audit: type=1400 audit(1719906913.772:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.831248 kernel: audit: type=1400 audit(1719906913.785:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.785000 audit: BPF prog-id=132 op=LOAD Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2401 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373139343562653632643462366638666534653165363535303664 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2401 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373139343562653632643462366638666534653165363535303664 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit: BPF prog-id=133 op=LOAD Jul 2 07:55:13.786000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000390cf0 items=0 ppid=2401 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373139343562653632643462366638666534653165363535303664 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.786000 audit: BPF prog-id=134 op=LOAD Jul 2 07:55:13.786000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000390d38 items=0 ppid=2401 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373139343562653632643462366638666534653165363535303664 Jul 2 07:55:13.786000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:55:13.786000 audit: BPF prog-id=133 op=UNLOAD Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:13.787000 audit: BPF prog-id=135 op=LOAD Jul 2 07:55:13.787000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000391148 items=0 ppid=2401 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373139343562653632643462366638666534653165363535303664 Jul 2 07:55:13.860009 env[1190]: time="2024-07-02T07:55:13.859953265Z" level=info msg="StartContainer for \"b671945be62d4b6f8fe4e1e65506dc4ece7118b8ca749b523c3d6c7c16a70339\" returns successfully" Jul 2 07:55:13.961062 kubelet[2021]: E0702 07:55:13.959377 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:13.984279 kubelet[2021]: I0702 07:55:13.984185 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6974bddb77-qngcg" podStartSLOduration=1.152302435 podStartE2EDuration="5.984165212s" podCreationTimestamp="2024-07-02 07:55:08 +0000 UTC" firstStartedPulling="2024-07-02 07:55:08.809232447 +0000 UTC m=+24.326528239" lastFinishedPulling="2024-07-02 07:55:13.641095219 +0000 UTC m=+29.158391016" observedRunningTime="2024-07-02 07:55:13.983722269 +0000 UTC m=+29.501018066" watchObservedRunningTime="2024-07-02 07:55:13.984165212 +0000 UTC m=+29.501461015" Jul 2 07:55:14.119369 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:14.120277 sshd[2519]: pam_unix(sshd:auth): check pass; user unknown Jul 2 07:55:14.121074 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:14.119000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=79.110.62.145 addr=79.110.62.145 terminal=ssh res=failed' Jul 2 07:55:14.650768 systemd[1]: run-containerd-runc-k8s.io-b671945be62d4b6f8fe4e1e65506dc4ece7118b8ca749b523c3d6c7c16a70339-runc.DvRwnc.mount: Deactivated successfully. Jul 2 07:55:14.964872 kubelet[2021]: I0702 07:55:14.964619 2021 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:55:14.965833 kubelet[2021]: E0702 07:55:14.965796 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:15.784409 kubelet[2021]: E0702 07:55:15.784113 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:16.361117 sshd[2519]: Failed password for invalid user user from 79.110.62.145 port 30992 ssh2 Jul 2 07:55:16.918439 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:16.919938 sshd[2519]: pam_unix(sshd:auth): check pass; user unknown Jul 2 07:55:16.920853 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:16.919000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=79.110.62.145 addr=79.110.62.145 terminal=ssh res=failed' Jul 2 07:55:17.785779 kubelet[2021]: E0702 07:55:17.784226 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:19.100662 sshd[2519]: Failed password for invalid user user from 79.110.62.145 port 30992 ssh2 Jul 2 07:55:19.298576 env[1190]: time="2024-07-02T07:55:19.298485503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:19.300620 env[1190]: time="2024-07-02T07:55:19.300553833Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:19.303114 env[1190]: time="2024-07-02T07:55:19.303041602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:19.304780 env[1190]: time="2024-07-02T07:55:19.304730098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:19.306067 env[1190]: time="2024-07-02T07:55:19.306012710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:55:19.313810 env[1190]: time="2024-07-02T07:55:19.313743268Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:55:19.333154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4109495617.mount: Deactivated successfully. Jul 2 07:55:19.341073 env[1190]: time="2024-07-02T07:55:19.341003322Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759\"" Jul 2 07:55:19.341815 env[1190]: time="2024-07-02T07:55:19.341771524Z" level=info msg="StartContainer for \"6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759\"" Jul 2 07:55:19.390093 systemd[1]: Started cri-containerd-6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759.scope. Jul 2 07:55:19.423614 kernel: kauditd_printk_skb: 49 callbacks suppressed Jul 2 07:55:19.423809 kernel: audit: type=1400 audit(1719906919.417:999): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.430038 kernel: audit: type=1300 audit(1719906919.417:999): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd58194b98 items=0 ppid=2450 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.417000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd58194b98 items=0 ppid=2450 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303132313633666338633966333337613832303965366430343034 Jul 2 07:55:19.437515 kernel: audit: type=1327 audit(1719906919.417:999): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303132313633666338633966333337613832303965366430343034 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.446390 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.446562 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.453510 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.461818 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.461975 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.466579 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.471466 kernel: audit: type=1400 audit(1719906919.417:1000): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.417000 audit: BPF prog-id=136 op=LOAD Jul 2 07:55:19.417000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c1258 items=0 ppid=2450 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303132313633666338633966333337613832303965366430343034 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit: BPF prog-id=137 op=LOAD Jul 2 07:55:19.422000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c12a8 items=0 ppid=2450 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303132313633666338633966333337613832303965366430343034 Jul 2 07:55:19.422000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:55:19.422000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:19.422000 audit: BPF prog-id=138 op=LOAD Jul 2 07:55:19.422000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001c1338 items=0 ppid=2450 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303132313633666338633966333337613832303965366430343034 Jul 2 07:55:19.475734 env[1190]: time="2024-07-02T07:55:19.475679990Z" level=info msg="StartContainer for \"6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759\" returns successfully" Jul 2 07:55:19.745037 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:19.747187 sshd[2519]: pam_unix(sshd:auth): check pass; user unknown Jul 2 07:55:19.748040 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:19.746000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=79.110.62.145 addr=79.110.62.145 terminal=ssh res=failed' Jul 2 07:55:19.786282 kubelet[2021]: E0702 07:55:19.786186 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:19.978102 kubelet[2021]: E0702 07:55:19.978063 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:19.990673 env[1190]: time="2024-07-02T07:55:19.990596419Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:55:19.994769 kubelet[2021]: I0702 07:55:19.994727 2021 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:55:19.996690 systemd[1]: cri-containerd-6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759.scope: Deactivated successfully. Jul 2 07:55:19.998000 audit: BPF prog-id=138 op=UNLOAD Jul 2 07:55:20.048396 env[1190]: time="2024-07-02T07:55:20.048314443Z" level=info msg="shim disconnected" id=6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759 Jul 2 07:55:20.048396 env[1190]: time="2024-07-02T07:55:20.048394682Z" level=warning msg="cleaning up after shim disconnected" id=6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759 namespace=k8s.io Jul 2 07:55:20.048727 env[1190]: time="2024-07-02T07:55:20.048410780Z" level=info msg="cleaning up dead shim" Jul 2 07:55:20.056335 kubelet[2021]: I0702 07:55:20.055657 2021 topology_manager.go:215] "Topology Admit Handler" podUID="c50a85f4-3220-4849-8b2a-39fb87d854f9" podNamespace="calico-system" podName="calico-kube-controllers-74c68885cb-nhgvm" Jul 2 07:55:20.066861 systemd[1]: Created slice kubepods-besteffort-podc50a85f4_3220_4849_8b2a_39fb87d854f9.slice. Jul 2 07:55:20.072405 kubelet[2021]: I0702 07:55:20.072347 2021 topology_manager.go:215] "Topology Admit Handler" podUID="f1e8ceba-0a93-4a0f-99a3-13a5669851c6" podNamespace="kube-system" podName="coredns-7db6d8ff4d-llckt" Jul 2 07:55:20.074143 kubelet[2021]: I0702 07:55:20.074083 2021 topology_manager.go:215] "Topology Admit Handler" podUID="3b4d270d-c156-478b-8b7f-9097929b7e4d" podNamespace="kube-system" podName="coredns-7db6d8ff4d-fgzmr" Jul 2 07:55:20.078690 env[1190]: time="2024-07-02T07:55:20.078527112Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2672 runtime=io.containerd.runc.v2\n" Jul 2 07:55:20.086133 systemd[1]: Created slice kubepods-burstable-pod3b4d270d_c156_478b_8b7f_9097929b7e4d.slice. Jul 2 07:55:20.094133 systemd[1]: Created slice kubepods-burstable-podf1e8ceba_0a93_4a0f_99a3_13a5669851c6.slice. Jul 2 07:55:20.206699 kubelet[2021]: I0702 07:55:20.206637 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m89x8\" (UniqueName: \"kubernetes.io/projected/f1e8ceba-0a93-4a0f-99a3-13a5669851c6-kube-api-access-m89x8\") pod \"coredns-7db6d8ff4d-llckt\" (UID: \"f1e8ceba-0a93-4a0f-99a3-13a5669851c6\") " pod="kube-system/coredns-7db6d8ff4d-llckt" Jul 2 07:55:20.207036 kubelet[2021]: I0702 07:55:20.207011 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vkcl5\" (UniqueName: \"kubernetes.io/projected/3b4d270d-c156-478b-8b7f-9097929b7e4d-kube-api-access-vkcl5\") pod \"coredns-7db6d8ff4d-fgzmr\" (UID: \"3b4d270d-c156-478b-8b7f-9097929b7e4d\") " pod="kube-system/coredns-7db6d8ff4d-fgzmr" Jul 2 07:55:20.207266 kubelet[2021]: I0702 07:55:20.207243 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f1e8ceba-0a93-4a0f-99a3-13a5669851c6-config-volume\") pod \"coredns-7db6d8ff4d-llckt\" (UID: \"f1e8ceba-0a93-4a0f-99a3-13a5669851c6\") " pod="kube-system/coredns-7db6d8ff4d-llckt" Jul 2 07:55:20.207506 kubelet[2021]: I0702 07:55:20.207489 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hh4b2\" (UniqueName: \"kubernetes.io/projected/c50a85f4-3220-4849-8b2a-39fb87d854f9-kube-api-access-hh4b2\") pod \"calico-kube-controllers-74c68885cb-nhgvm\" (UID: \"c50a85f4-3220-4849-8b2a-39fb87d854f9\") " pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" Jul 2 07:55:20.207625 kubelet[2021]: I0702 07:55:20.207610 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3b4d270d-c156-478b-8b7f-9097929b7e4d-config-volume\") pod \"coredns-7db6d8ff4d-fgzmr\" (UID: \"3b4d270d-c156-478b-8b7f-9097929b7e4d\") " pod="kube-system/coredns-7db6d8ff4d-fgzmr" Jul 2 07:55:20.207748 kubelet[2021]: I0702 07:55:20.207734 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c50a85f4-3220-4849-8b2a-39fb87d854f9-tigera-ca-bundle\") pod \"calico-kube-controllers-74c68885cb-nhgvm\" (UID: \"c50a85f4-3220-4849-8b2a-39fb87d854f9\") " pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" Jul 2 07:55:20.329377 systemd[1]: run-containerd-runc-k8s.io-6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759-runc.SfORgT.mount: Deactivated successfully. Jul 2 07:55:20.329568 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6c012163fc8c9f337a8209e6d0404000aa825c2d8995adb492a8464570590759-rootfs.mount: Deactivated successfully. Jul 2 07:55:20.372213 env[1190]: time="2024-07-02T07:55:20.372161999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74c68885cb-nhgvm,Uid:c50a85f4-3220-4849-8b2a-39fb87d854f9,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:20.391808 kubelet[2021]: E0702 07:55:20.391766 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:20.398322 kubelet[2021]: E0702 07:55:20.398282 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:20.402829 env[1190]: time="2024-07-02T07:55:20.402772015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fgzmr,Uid:3b4d270d-c156-478b-8b7f-9097929b7e4d,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:20.412248 env[1190]: time="2024-07-02T07:55:20.412199546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-llckt,Uid:f1e8ceba-0a93-4a0f-99a3-13a5669851c6,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:20.532033 env[1190]: time="2024-07-02T07:55:20.531920345Z" level=error msg="Failed to destroy network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.532542 env[1190]: time="2024-07-02T07:55:20.532491240Z" level=error msg="encountered an error cleaning up failed sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.532687 env[1190]: time="2024-07-02T07:55:20.532563574Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74c68885cb-nhgvm,Uid:c50a85f4-3220-4849-8b2a-39fb87d854f9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.534497 kubelet[2021]: E0702 07:55:20.533004 2021 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.534497 kubelet[2021]: E0702 07:55:20.533100 2021 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" Jul 2 07:55:20.534497 kubelet[2021]: E0702 07:55:20.533135 2021 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" Jul 2 07:55:20.534956 kubelet[2021]: E0702 07:55:20.533206 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74c68885cb-nhgvm_calico-system(c50a85f4-3220-4849-8b2a-39fb87d854f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74c68885cb-nhgvm_calico-system(c50a85f4-3220-4849-8b2a-39fb87d854f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" podUID="c50a85f4-3220-4849-8b2a-39fb87d854f9" Jul 2 07:55:20.576109 env[1190]: time="2024-07-02T07:55:20.576025807Z" level=error msg="Failed to destroy network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.576627 env[1190]: time="2024-07-02T07:55:20.576581514Z" level=error msg="encountered an error cleaning up failed sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.576728 env[1190]: time="2024-07-02T07:55:20.576657310Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fgzmr,Uid:3b4d270d-c156-478b-8b7f-9097929b7e4d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.577018 kubelet[2021]: E0702 07:55:20.576973 2021 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.577116 kubelet[2021]: E0702 07:55:20.577065 2021 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fgzmr" Jul 2 07:55:20.577174 kubelet[2021]: E0702 07:55:20.577113 2021 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fgzmr" Jul 2 07:55:20.577230 kubelet[2021]: E0702 07:55:20.577164 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-fgzmr_kube-system(3b4d270d-c156-478b-8b7f-9097929b7e4d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-fgzmr_kube-system(3b4d270d-c156-478b-8b7f-9097929b7e4d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fgzmr" podUID="3b4d270d-c156-478b-8b7f-9097929b7e4d" Jul 2 07:55:20.584034 env[1190]: time="2024-07-02T07:55:20.582945717Z" level=error msg="Failed to destroy network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.584034 env[1190]: time="2024-07-02T07:55:20.583487261Z" level=error msg="encountered an error cleaning up failed sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.584034 env[1190]: time="2024-07-02T07:55:20.583560898Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-llckt,Uid:f1e8ceba-0a93-4a0f-99a3-13a5669851c6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.584605 kubelet[2021]: E0702 07:55:20.583901 2021 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:20.584605 kubelet[2021]: E0702 07:55:20.583991 2021 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-llckt" Jul 2 07:55:20.584605 kubelet[2021]: E0702 07:55:20.584061 2021 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-llckt" Jul 2 07:55:20.584813 kubelet[2021]: E0702 07:55:20.584146 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-llckt_kube-system(f1e8ceba-0a93-4a0f-99a3-13a5669851c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-llckt_kube-system(f1e8ceba-0a93-4a0f-99a3-13a5669851c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-llckt" podUID="f1e8ceba-0a93-4a0f-99a3-13a5669851c6" Jul 2 07:55:20.982060 kubelet[2021]: I0702 07:55:20.980630 2021 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:20.984451 env[1190]: time="2024-07-02T07:55:20.983765378Z" level=info msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" Jul 2 07:55:21.004884 kubelet[2021]: I0702 07:55:21.004826 2021 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:21.007976 env[1190]: time="2024-07-02T07:55:21.007856027Z" level=info msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" Jul 2 07:55:21.018502 kubelet[2021]: I0702 07:55:21.018458 2021 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:21.020842 env[1190]: time="2024-07-02T07:55:21.020762559Z" level=info msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" Jul 2 07:55:21.031480 kubelet[2021]: E0702 07:55:21.031402 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:21.041186 env[1190]: time="2024-07-02T07:55:21.041027224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:55:21.092948 env[1190]: time="2024-07-02T07:55:21.092857414Z" level=error msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" failed" error="failed to destroy network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.093567 kubelet[2021]: E0702 07:55:21.093491 2021 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:21.093786 kubelet[2021]: E0702 07:55:21.093602 2021 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97"} Jul 2 07:55:21.093786 kubelet[2021]: E0702 07:55:21.093683 2021 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b4d270d-c156-478b-8b7f-9097929b7e4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:55:21.093786 kubelet[2021]: E0702 07:55:21.093709 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b4d270d-c156-478b-8b7f-9097929b7e4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fgzmr" podUID="3b4d270d-c156-478b-8b7f-9097929b7e4d" Jul 2 07:55:21.111459 env[1190]: time="2024-07-02T07:55:21.111352408Z" level=error msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" failed" error="failed to destroy network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.112191 kubelet[2021]: E0702 07:55:21.112089 2021 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:21.112368 kubelet[2021]: E0702 07:55:21.112216 2021 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab"} Jul 2 07:55:21.112368 kubelet[2021]: E0702 07:55:21.112254 2021 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c50a85f4-3220-4849-8b2a-39fb87d854f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:55:21.112571 kubelet[2021]: E0702 07:55:21.112478 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c50a85f4-3220-4849-8b2a-39fb87d854f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" podUID="c50a85f4-3220-4849-8b2a-39fb87d854f9" Jul 2 07:55:21.142889 env[1190]: time="2024-07-02T07:55:21.142797851Z" level=error msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" failed" error="failed to destroy network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.143754 kubelet[2021]: E0702 07:55:21.143616 2021 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:21.143754 kubelet[2021]: E0702 07:55:21.143708 2021 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309"} Jul 2 07:55:21.143948 kubelet[2021]: E0702 07:55:21.143768 2021 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f1e8ceba-0a93-4a0f-99a3-13a5669851c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:55:21.143948 kubelet[2021]: E0702 07:55:21.143794 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f1e8ceba-0a93-4a0f-99a3-13a5669851c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-llckt" podUID="f1e8ceba-0a93-4a0f-99a3-13a5669851c6" Jul 2 07:55:21.330400 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab-shm.mount: Deactivated successfully. Jul 2 07:55:21.672554 sshd[2519]: Failed password for invalid user user from 79.110.62.145 port 30992 ssh2 Jul 2 07:55:21.790500 systemd[1]: Created slice kubepods-besteffort-pod809a447d_7284_46e7_a8cf_14b6eb923d1e.slice. Jul 2 07:55:21.795001 env[1190]: time="2024-07-02T07:55:21.794947257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-285st,Uid:809a447d-7284-46e7-a8cf-14b6eb923d1e,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:21.898274 env[1190]: time="2024-07-02T07:55:21.898203031Z" level=error msg="Failed to destroy network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.901478 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65-shm.mount: Deactivated successfully. Jul 2 07:55:21.903163 env[1190]: time="2024-07-02T07:55:21.903091291Z" level=error msg="encountered an error cleaning up failed sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.903446 env[1190]: time="2024-07-02T07:55:21.903394145Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-285st,Uid:809a447d-7284-46e7-a8cf-14b6eb923d1e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.903915 kubelet[2021]: E0702 07:55:21.903861 2021 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:21.904045 kubelet[2021]: E0702 07:55:21.903960 2021 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-285st" Jul 2 07:55:21.904045 kubelet[2021]: E0702 07:55:21.903995 2021 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-285st" Jul 2 07:55:21.904119 kubelet[2021]: E0702 07:55:21.904054 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-285st_calico-system(809a447d-7284-46e7-a8cf-14b6eb923d1e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-285st_calico-system(809a447d-7284-46e7-a8cf-14b6eb923d1e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:22.034534 kubelet[2021]: I0702 07:55:22.034386 2021 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:22.036012 env[1190]: time="2024-07-02T07:55:22.035954127Z" level=info msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" Jul 2 07:55:22.081163 env[1190]: time="2024-07-02T07:55:22.080930174Z" level=error msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" failed" error="failed to destroy network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:55:22.081609 kubelet[2021]: E0702 07:55:22.081539 2021 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:22.081768 kubelet[2021]: E0702 07:55:22.081616 2021 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65"} Jul 2 07:55:22.081768 kubelet[2021]: E0702 07:55:22.081663 2021 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"809a447d-7284-46e7-a8cf-14b6eb923d1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:55:22.081768 kubelet[2021]: E0702 07:55:22.081694 2021 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"809a447d-7284-46e7-a8cf-14b6eb923d1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-285st" podUID="809a447d-7284-46e7-a8cf-14b6eb923d1e" Jul 2 07:55:22.518172 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:22.519525 sshd[2519]: pam_unix(sshd:auth): check pass; user unknown Jul 2 07:55:22.519000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=79.110.62.145 addr=79.110.62.145 terminal=ssh res=failed' Jul 2 07:55:22.520670 sshd[2519]: pam_faillock(sshd:auth): User unknown Jul 2 07:55:24.188884 sshd[2519]: Failed password for invalid user user from 79.110.62.145 port 30992 ssh2 Jul 2 07:55:25.316532 sshd[2519]: Received disconnect from 79.110.62.145 port 30992:11: Bye [preauth] Jul 2 07:55:25.316532 sshd[2519]: Disconnected from invalid user user 79.110.62.145 port 30992 [preauth] Jul 2 07:55:25.317329 sshd[2519]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.62.145 Jul 2 07:55:25.317339 sshd[2519]: PAM service(sshd) ignoring max retries; 5 > 3 Jul 2 07:55:25.326748 kernel: kauditd_printk_skb: 36 callbacks suppressed Jul 2 07:55:25.326925 kernel: audit: type=1131 audit(1719906925.318:1008): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.188.4:22-79.110.62.145:30992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:25.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.188.4:22-79.110.62.145:30992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:25.319699 systemd[1]: sshd@7-137.184.188.4:22-79.110.62.145:30992.service: Deactivated successfully. Jul 2 07:55:28.085857 kubelet[2021]: I0702 07:55:28.085803 2021 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:55:28.112102 kubelet[2021]: E0702 07:55:28.112061 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:28.237043 kernel: audit: type=1325 audit(1719906928.225:1009): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:28.237235 kernel: audit: type=1300 audit(1719906928.225:1009): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffbf137760 a2=0 a3=7fffbf13774c items=0 ppid=2212 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.225000 audit[2896]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:28.225000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffbf137760 a2=0 a3=7fffbf13774c items=0 ppid=2212 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:28.242873 kernel: audit: type=1327 audit(1719906928.225:1009): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:28.229000 audit[2896]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:28.229000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffbf137760 a2=0 a3=7fffbf13774c items=0 ppid=2212 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.251877 kernel: audit: type=1325 audit(1719906928.229:1010): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:28.252045 kernel: audit: type=1300 audit(1719906928.229:1010): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffbf137760 a2=0 a3=7fffbf13774c items=0 ppid=2212 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.252086 kernel: audit: type=1327 audit(1719906928.229:1010): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:28.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:29.060094 kubelet[2021]: E0702 07:55:29.060039 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:29.484832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2933443143.mount: Deactivated successfully. Jul 2 07:55:29.540653 env[1190]: time="2024-07-02T07:55:29.540574234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:29.545364 env[1190]: time="2024-07-02T07:55:29.545295633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:29.548167 env[1190]: time="2024-07-02T07:55:29.548099396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:29.550057 env[1190]: time="2024-07-02T07:55:29.549972782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:29.551512 env[1190]: time="2024-07-02T07:55:29.551398530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:55:29.603154 env[1190]: time="2024-07-02T07:55:29.601845415Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:55:29.624691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2453251886.mount: Deactivated successfully. Jul 2 07:55:29.633715 env[1190]: time="2024-07-02T07:55:29.633618995Z" level=info msg="CreateContainer within sandbox \"59b7647b8491d70b414d7027186147f58c81ae251cbaac0e03034eab2812bd27\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1\"" Jul 2 07:55:29.635857 env[1190]: time="2024-07-02T07:55:29.635779937Z" level=info msg="StartContainer for \"105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1\"" Jul 2 07:55:29.668407 systemd[1]: Started cri-containerd-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1.scope. Jul 2 07:55:29.709000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.715455 kernel: audit: type=1400 audit(1719906929.709:1011): avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.709000 audit[2907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f28e818f238 items=0 ppid=2450 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130356539626130363437356665353363333930356265626234373738 Jul 2 07:55:29.726805 kernel: audit: type=1300 audit(1719906929.709:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f28e818f238 items=0 ppid=2450 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.727059 kernel: audit: type=1327 audit(1719906929.709:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130356539626130363437356665353363333930356265626234373738 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit: BPF prog-id=139 op=LOAD Jul 2 07:55:29.713000 audit[2907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00025ac58 items=0 ppid=2450 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130356539626130363437356665353363333930356265626234373738 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit: BPF prog-id=140 op=LOAD Jul 2 07:55:29.713000 audit[2907]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00025aca8 items=0 ppid=2450 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130356539626130363437356665353363333930356265626234373738 Jul 2 07:55:29.713000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:55:29.713000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:29.713000 audit: BPF prog-id=141 op=LOAD Jul 2 07:55:29.713000 audit[2907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00025ad38 items=0 ppid=2450 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130356539626130363437356665353363333930356265626234373738 Jul 2 07:55:29.752438 env[1190]: time="2024-07-02T07:55:29.752228679Z" level=info msg="StartContainer for \"105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1\" returns successfully" Jul 2 07:55:29.897519 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:55:29.897718 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:55:30.069828 kubelet[2021]: E0702 07:55:30.069745 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:30.283176 kubelet[2021]: I0702 07:55:30.281155 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6bncx" podStartSLOduration=1.449694585 podStartE2EDuration="22.279563378s" podCreationTimestamp="2024-07-02 07:55:08 +0000 UTC" firstStartedPulling="2024-07-02 07:55:08.726034127 +0000 UTC m=+24.243329912" lastFinishedPulling="2024-07-02 07:55:29.555902925 +0000 UTC m=+45.073198705" observedRunningTime="2024-07-02 07:55:30.276311145 +0000 UTC m=+45.793606936" watchObservedRunningTime="2024-07-02 07:55:30.279563378 +0000 UTC m=+45.796859184" Jul 2 07:55:31.072457 kubelet[2021]: E0702 07:55:31.072128 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:31.101510 systemd[1]: run-containerd-runc-k8s.io-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1-runc.LHg08C.mount: Deactivated successfully. Jul 2 07:55:31.885000 audit[3050]: AVC avc: denied { write } for pid=3050 comm="tee" name="fd" dev="proc" ino=24909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.888201 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 07:55:31.888352 kernel: audit: type=1400 audit(1719906931.885:1017): avc: denied { write } for pid=3050 comm="tee" name="fd" dev="proc" ino=24909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.885000 audit[3050]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda564f9f6 a2=241 a3=1b6 items=1 ppid=3018 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.898455 kernel: audit: type=1300 audit(1719906931.885:1017): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda564f9f6 a2=241 a3=1b6 items=1 ppid=3018 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.885000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:55:31.885000 audit: PATH item=0 name="/dev/fd/63" inode=24906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.904680 kernel: audit: type=1307 audit(1719906931.885:1017): cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:55:31.904824 kernel: audit: type=1302 audit(1719906931.885:1017): item=0 name="/dev/fd/63" inode=24906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:31.908443 kernel: audit: type=1327 audit(1719906931.885:1017): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:31.955000 audit[3071]: AVC avc: denied { write } for pid=3071 comm="tee" name="fd" dev="proc" ino=24150 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.961459 kernel: audit: type=1400 audit(1719906931.955:1018): avc: denied { write } for pid=3071 comm="tee" name="fd" dev="proc" ino=24150 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.961000 audit[3078]: AVC avc: denied { write } for pid=3078 comm="tee" name="fd" dev="proc" ino=24922 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.961000 audit[3078]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee684fa05 a2=241 a3=1b6 items=1 ppid=3024 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.972638 kernel: audit: type=1400 audit(1719906931.961:1019): avc: denied { write } for pid=3078 comm="tee" name="fd" dev="proc" ino=24922 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.972798 kernel: audit: type=1300 audit(1719906931.961:1019): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee684fa05 a2=241 a3=1b6 items=1 ppid=3024 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.961000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:55:31.961000 audit: PATH item=0 name="/dev/fd/63" inode=24138 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.979729 kernel: audit: type=1307 audit(1719906931.961:1019): cwd="/etc/service/enabled/bird6/log" Jul 2 07:55:31.979921 kernel: audit: type=1302 audit(1719906931.961:1019): item=0 name="/dev/fd/63" inode=24138 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:31.978000 audit[3069]: AVC avc: denied { write } for pid=3069 comm="tee" name="fd" dev="proc" ino=24151 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.978000 audit[3069]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe122a0a06 a2=241 a3=1b6 items=1 ppid=3019 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.978000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:55:31.978000 audit: PATH item=0 name="/dev/fd/63" inode=24915 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.978000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:31.955000 audit[3071]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3d006a05 a2=241 a3=1b6 items=1 ppid=3016 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.955000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:55:31.955000 audit: PATH item=0 name="/dev/fd/63" inode=24916 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:31.990000 audit[3081]: AVC avc: denied { write } for pid=3081 comm="tee" name="fd" dev="proc" ino=24158 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:31.990000 audit[3081]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5d2cca05 a2=241 a3=1b6 items=1 ppid=3025 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.990000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:55:31.990000 audit: PATH item=0 name="/dev/fd/63" inode=24143 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:31.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:32.007000 audit[3085]: AVC avc: denied { write } for pid=3085 comm="tee" name="fd" dev="proc" ino=24162 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:32.007000 audit[3085]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcfa5ba07 a2=241 a3=1b6 items=1 ppid=3014 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.007000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:55:32.007000 audit: PATH item=0 name="/dev/fd/63" inode=24919 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:32.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:32.016000 audit[3089]: AVC avc: denied { write } for pid=3089 comm="tee" name="fd" dev="proc" ino=24166 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:55:32.016000 audit[3089]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6eca59f5 a2=241 a3=1b6 items=1 ppid=3022 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.016000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:55:32.016000 audit: PATH item=0 name="/dev/fd/63" inode=24933 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:32.016000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:55:32.077720 kubelet[2021]: E0702 07:55:32.077541 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:32.122350 systemd[1]: run-containerd-runc-k8s.io-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1-runc.CnkN2S.mount: Deactivated successfully. Jul 2 07:55:32.548671 systemd-networkd[999]: vxlan.calico: Link UP Jul 2 07:55:32.548708 systemd-networkd[999]: vxlan.calico: Gained carrier Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit: BPF prog-id=142 op=LOAD Jul 2 07:55:32.571000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdb5b6550 a2=70 a3=7fa44d007000 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.571000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.571000 audit: BPF prog-id=143 op=LOAD Jul 2 07:55:32.571000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdb5b6550 a2=70 a3=6f items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.572000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:55:32.572000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.572000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcdb5b6500 a2=70 a3=7ffcdb5b6550 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.573000 audit: BPF prog-id=144 op=LOAD Jul 2 07:55:32.573000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcdb5b64e0 a2=70 a3=7ffcdb5b6550 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.576000 audit: BPF prog-id=144 op=UNLOAD Jul 2 07:55:32.576000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.576000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb5b65c0 a2=70 a3=0 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.576000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.576000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.576000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb5b65b0 a2=70 a3=0 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.576000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.576000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.576000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb5b6520 a2=70 a3=0 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.576000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.577000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.577000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcdb5b65f0 a2=70 a3=fc48b0 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.577000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdb5b65f0 a2=70 a3=fc1880 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.578000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.578000 audit: BPF prog-id=145 op=LOAD Jul 2 07:55:32.578000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdb5b6510 a2=70 a3=0 items=0 ppid=3017 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.578000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:55:32.589000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.589000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff65e60b60 a2=70 a3=fff80800 items=0 ppid=3017 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:55:32.589000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:32.589000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff65e60a30 a2=70 a3=3 items=0 ppid=3017 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:55:32.596000 audit: BPF prog-id=145 op=UNLOAD Jul 2 07:55:32.704000 audit[3208]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:32.704000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe476f6960 a2=0 a3=7ffe476f694c items=0 ppid=3017 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.704000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:32.725000 audit[3210]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:32.725000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff0feb3010 a2=0 a3=7fff0feb2ffc items=0 ppid=3017 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.725000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:32.726000 audit[3213]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:32.726000 audit[3213]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdb0d39060 a2=0 a3=7ffdb0d3904c items=0 ppid=3017 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:32.727000 audit[3209]: NETFILTER_CFG table=raw:100 family=2 entries=19 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:32.727000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc9d98da50 a2=0 a3=55765869b000 items=0 ppid=3017 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.727000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:33.791456 env[1190]: time="2024-07-02T07:55:33.791163696Z" level=info msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.869 [INFO][3234] k8s.go 608: Cleaning up netns ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.871 [INFO][3234] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" iface="eth0" netns="/var/run/netns/cni-d02dbb13-9537-6d41-f508-98765d152be4" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.872 [INFO][3234] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" iface="eth0" netns="/var/run/netns/cni-d02dbb13-9537-6d41-f508-98765d152be4" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.873 [INFO][3234] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" iface="eth0" netns="/var/run/netns/cni-d02dbb13-9537-6d41-f508-98765d152be4" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.873 [INFO][3234] k8s.go 615: Releasing IP address(es) ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.873 [INFO][3234] utils.go 188: Calico CNI releasing IP address ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.974 [INFO][3240] ipam_plugin.go 411: Releasing address using handleID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.975 [INFO][3240] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.975 [INFO][3240] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.987 [WARNING][3240] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.987 [INFO][3240] ipam_plugin.go 439: Releasing address using workloadID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.991 [INFO][3240] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:33.998199 env[1190]: 2024-07-02 07:55:33.993 [INFO][3234] k8s.go 621: Teardown processing complete. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:34.001692 systemd[1]: run-netns-cni\x2dd02dbb13\x2d9537\x2d6d41\x2df508\x2d98765d152be4.mount: Deactivated successfully. Jul 2 07:55:34.004670 env[1190]: time="2024-07-02T07:55:34.004603784Z" level=info msg="TearDown network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" successfully" Jul 2 07:55:34.004870 env[1190]: time="2024-07-02T07:55:34.004842683Z" level=info msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" returns successfully" Jul 2 07:55:34.006792 env[1190]: time="2024-07-02T07:55:34.006715500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74c68885cb-nhgvm,Uid:c50a85f4-3220-4849-8b2a-39fb87d854f9,Namespace:calico-system,Attempt:1,}" Jul 2 07:55:34.219716 systemd-networkd[999]: caliaeff696b167: Link UP Jul 2 07:55:34.221475 systemd-networkd[999]: vxlan.calico: Gained IPv6LL Jul 2 07:55:34.223815 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:55:34.223926 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaeff696b167: link becomes ready Jul 2 07:55:34.223603 systemd-networkd[999]: caliaeff696b167: Gained carrier Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.088 [INFO][3249] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0 calico-kube-controllers-74c68885cb- calico-system c50a85f4-3220-4849-8b2a-39fb87d854f9 729 0 2024-07-02 07:55:08 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74c68885cb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-4df693d906 calico-kube-controllers-74c68885cb-nhgvm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaeff696b167 [] []}} ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.089 [INFO][3249] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.147 [INFO][3262] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" HandleID="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.160 [INFO][3262] ipam_plugin.go 264: Auto assigning IP ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" HandleID="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000342510), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-4df693d906", "pod":"calico-kube-controllers-74c68885cb-nhgvm", "timestamp":"2024-07-02 07:55:34.147167112 +0000 UTC"}, Hostname:"ci-3510.3.5-a-4df693d906", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.160 [INFO][3262] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.160 [INFO][3262] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.160 [INFO][3262] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-4df693d906' Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.164 [INFO][3262] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.173 [INFO][3262] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.183 [INFO][3262] ipam.go 489: Trying affinity for 192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.186 [INFO][3262] ipam.go 155: Attempting to load block cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.190 [INFO][3262] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.190 [INFO][3262] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.0/26 handle="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.193 [INFO][3262] ipam.go 1685: Creating new handle: k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135 Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.200 [INFO][3262] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.0/26 handle="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.209 [INFO][3262] ipam.go 1216: Successfully claimed IPs: [192.168.38.1/26] block=192.168.38.0/26 handle="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.209 [INFO][3262] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.1/26] handle="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.209 [INFO][3262] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:34.252224 env[1190]: 2024-07-02 07:55:34.209 [INFO][3262] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.38.1/26] IPv6=[] ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" HandleID="k8s-pod-network.0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.214 [INFO][3249] k8s.go 386: Populated endpoint ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0", GenerateName:"calico-kube-controllers-74c68885cb-", Namespace:"calico-system", SelfLink:"", UID:"c50a85f4-3220-4849-8b2a-39fb87d854f9", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74c68885cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"", Pod:"calico-kube-controllers-74c68885cb-nhgvm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaeff696b167", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.215 [INFO][3249] k8s.go 387: Calico CNI using IPs: [192.168.38.1/32] ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.215 [INFO][3249] dataplane_linux.go 68: Setting the host side veth name to caliaeff696b167 ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.224 [INFO][3249] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.229 [INFO][3249] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0", GenerateName:"calico-kube-controllers-74c68885cb-", Namespace:"calico-system", SelfLink:"", UID:"c50a85f4-3220-4849-8b2a-39fb87d854f9", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74c68885cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135", Pod:"calico-kube-controllers-74c68885cb-nhgvm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaeff696b167", MAC:"f2:1f:14:40:f2:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:34.253672 env[1190]: 2024-07-02 07:55:34.245 [INFO][3249] k8s.go 500: Wrote updated endpoint to datastore ContainerID="0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135" Namespace="calico-system" Pod="calico-kube-controllers-74c68885cb-nhgvm" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:34.280000 audit[3275]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3275 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:34.280000 audit[3275]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff52484a50 a2=0 a3=7fff52484a3c items=0 ppid=3017 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:34.300486 env[1190]: time="2024-07-02T07:55:34.300274056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:34.300486 env[1190]: time="2024-07-02T07:55:34.300345532Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:34.300486 env[1190]: time="2024-07-02T07:55:34.300363033Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:34.300879 env[1190]: time="2024-07-02T07:55:34.300645874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135 pid=3289 runtime=io.containerd.runc.v2 Jul 2 07:55:34.332627 systemd[1]: Started cri-containerd-0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135.scope. Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.361000 audit: BPF prog-id=146 op=LOAD Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3289 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656136643038356363633031363164346462356130636230663730 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3289 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656136643038356363633031363164346462356130636230663730 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.362000 audit: BPF prog-id=147 op=LOAD Jul 2 07:55:34.362000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031c8d0 items=0 ppid=3289 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656136643038356363633031363164346462356130636230663730 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit: BPF prog-id=148 op=LOAD Jul 2 07:55:34.363000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031c918 items=0 ppid=3289 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656136643038356363633031363164346462356130636230663730 Jul 2 07:55:34.363000 audit: BPF prog-id=148 op=UNLOAD Jul 2 07:55:34.363000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:34.363000 audit: BPF prog-id=149 op=LOAD Jul 2 07:55:34.363000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031cd28 items=0 ppid=3289 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656136643038356363633031363164346462356130636230663730 Jul 2 07:55:34.403523 env[1190]: time="2024-07-02T07:55:34.403460903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74c68885cb-nhgvm,Uid:c50a85f4-3220-4849-8b2a-39fb87d854f9,Namespace:calico-system,Attempt:1,} returns sandbox id \"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135\"" Jul 2 07:55:34.408160 env[1190]: time="2024-07-02T07:55:34.408086626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:55:34.787670 env[1190]: time="2024-07-02T07:55:34.787238566Z" level=info msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" Jul 2 07:55:34.788468 env[1190]: time="2024-07-02T07:55:34.788378032Z" level=info msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" Jul 2 07:55:34.789392 env[1190]: time="2024-07-02T07:55:34.788893364Z" level=info msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" Jul 2 07:55:35.001594 systemd[1]: run-containerd-runc-k8s.io-0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135-runc.b2kevA.mount: Deactivated successfully. Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.919 [INFO][3364] k8s.go 608: Cleaning up netns ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.922 [INFO][3364] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" iface="eth0" netns="/var/run/netns/cni-1cbfebd5-f308-d9c9-c189-b51e67b60765" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.922 [INFO][3364] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" iface="eth0" netns="/var/run/netns/cni-1cbfebd5-f308-d9c9-c189-b51e67b60765" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.924 [INFO][3364] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" iface="eth0" netns="/var/run/netns/cni-1cbfebd5-f308-d9c9-c189-b51e67b60765" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.924 [INFO][3364] k8s.go 615: Releasing IP address(es) ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.924 [INFO][3364] utils.go 188: Calico CNI releasing IP address ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.983 [INFO][3387] ipam_plugin.go 411: Releasing address using handleID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.983 [INFO][3387] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.984 [INFO][3387] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.993 [WARNING][3387] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.993 [INFO][3387] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.996 [INFO][3387] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.003845 env[1190]: 2024-07-02 07:55:34.998 [INFO][3364] k8s.go 621: Teardown processing complete. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:35.012941 env[1190]: time="2024-07-02T07:55:35.006931519Z" level=info msg="TearDown network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" successfully" Jul 2 07:55:35.012941 env[1190]: time="2024-07-02T07:55:35.007004426Z" level=info msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" returns successfully" Jul 2 07:55:35.013083 kubelet[2021]: E0702 07:55:35.009071 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:35.006824 systemd[1]: run-netns-cni\x2d1cbfebd5\x2df308\x2dd9c9\x2dc189\x2db51e67b60765.mount: Deactivated successfully. Jul 2 07:55:35.014592 env[1190]: time="2024-07-02T07:55:35.014551711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fgzmr,Uid:3b4d270d-c156-478b-8b7f-9097929b7e4d,Namespace:kube-system,Attempt:1,}" Jul 2 07:55:35.067151 kubelet[2021]: E0702 07:55:35.064675 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:35.066308 systemd[1]: run-netns-cni\x2d71c5131b\x2dbb3d\x2d18dc\x2d02c8\x2d58ae209ca4b9.mount: Deactivated successfully. Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.889 [INFO][3355] k8s.go 608: Cleaning up netns ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.889 [INFO][3355] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" iface="eth0" netns="/var/run/netns/cni-71c5131b-bb3d-18dc-02c8-58ae209ca4b9" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.889 [INFO][3355] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" iface="eth0" netns="/var/run/netns/cni-71c5131b-bb3d-18dc-02c8-58ae209ca4b9" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.889 [INFO][3355] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" iface="eth0" netns="/var/run/netns/cni-71c5131b-bb3d-18dc-02c8-58ae209ca4b9" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.890 [INFO][3355] k8s.go 615: Releasing IP address(es) ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:34.890 [INFO][3355] utils.go 188: Calico CNI releasing IP address ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.017 [INFO][3381] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.017 [INFO][3381] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.017 [INFO][3381] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.031 [WARNING][3381] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.031 [INFO][3381] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.034 [INFO][3381] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.067470 env[1190]: 2024-07-02 07:55:35.047 [INFO][3355] k8s.go 621: Teardown processing complete. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:35.067470 env[1190]: time="2024-07-02T07:55:35.064053832Z" level=info msg="TearDown network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" successfully" Jul 2 07:55:35.067470 env[1190]: time="2024-07-02T07:55:35.064106692Z" level=info msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" returns successfully" Jul 2 07:55:35.067470 env[1190]: time="2024-07-02T07:55:35.065699658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-llckt,Uid:f1e8ceba-0a93-4a0f-99a3-13a5669851c6,Namespace:kube-system,Attempt:1,}" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.937 [INFO][3374] k8s.go 608: Cleaning up netns ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.938 [INFO][3374] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" iface="eth0" netns="/var/run/netns/cni-1022cb20-eeab-977b-672b-cb78b97d25c4" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.938 [INFO][3374] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" iface="eth0" netns="/var/run/netns/cni-1022cb20-eeab-977b-672b-cb78b97d25c4" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.938 [INFO][3374] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" iface="eth0" netns="/var/run/netns/cni-1022cb20-eeab-977b-672b-cb78b97d25c4" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.938 [INFO][3374] k8s.go 615: Releasing IP address(es) ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:34.938 [INFO][3374] utils.go 188: Calico CNI releasing IP address ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.056 [INFO][3392] ipam_plugin.go 411: Releasing address using handleID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.056 [INFO][3392] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.057 [INFO][3392] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.084 [WARNING][3392] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.084 [INFO][3392] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.089 [INFO][3392] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.097962 env[1190]: 2024-07-02 07:55:35.096 [INFO][3374] k8s.go 621: Teardown processing complete. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:35.098892 env[1190]: time="2024-07-02T07:55:35.098165844Z" level=info msg="TearDown network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" successfully" Jul 2 07:55:35.098892 env[1190]: time="2024-07-02T07:55:35.098211559Z" level=info msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" returns successfully" Jul 2 07:55:35.099998 env[1190]: time="2024-07-02T07:55:35.099933860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-285st,Uid:809a447d-7284-46e7-a8cf-14b6eb923d1e,Namespace:calico-system,Attempt:1,}" Jul 2 07:55:35.403778 systemd-networkd[999]: cali6420a2dc8eb: Link UP Jul 2 07:55:35.409869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:55:35.410883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6420a2dc8eb: link becomes ready Jul 2 07:55:35.410203 systemd-networkd[999]: cali6420a2dc8eb: Gained carrier Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.207 [INFO][3400] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0 coredns-7db6d8ff4d- kube-system 3b4d270d-c156-478b-8b7f-9097929b7e4d 739 0 2024-07-02 07:54:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-4df693d906 coredns-7db6d8ff4d-fgzmr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6420a2dc8eb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.207 [INFO][3400] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.303 [INFO][3439] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" HandleID="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.325 [INFO][3439] ipam_plugin.go 264: Auto assigning IP ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" HandleID="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000364160), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-4df693d906", "pod":"coredns-7db6d8ff4d-fgzmr", "timestamp":"2024-07-02 07:55:35.303612517 +0000 UTC"}, Hostname:"ci-3510.3.5-a-4df693d906", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.325 [INFO][3439] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.325 [INFO][3439] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.325 [INFO][3439] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-4df693d906' Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.337 [INFO][3439] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.351 [INFO][3439] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.362 [INFO][3439] ipam.go 489: Trying affinity for 192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.365 [INFO][3439] ipam.go 155: Attempting to load block cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.369 [INFO][3439] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.369 [INFO][3439] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.0/26 handle="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.372 [INFO][3439] ipam.go 1685: Creating new handle: k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.378 [INFO][3439] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.0/26 handle="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.387 [INFO][3439] ipam.go 1216: Successfully claimed IPs: [192.168.38.2/26] block=192.168.38.0/26 handle="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.387 [INFO][3439] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.2/26] handle="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.387 [INFO][3439] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.432096 env[1190]: 2024-07-02 07:55:35.387 [INFO][3439] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.38.2/26] IPv6=[] ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" HandleID="k8s-pod-network.b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.390 [INFO][3400] k8s.go 386: Populated endpoint ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3b4d270d-c156-478b-8b7f-9097929b7e4d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"", Pod:"coredns-7db6d8ff4d-fgzmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6420a2dc8eb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.390 [INFO][3400] k8s.go 387: Calico CNI using IPs: [192.168.38.2/32] ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.390 [INFO][3400] dataplane_linux.go 68: Setting the host side veth name to cali6420a2dc8eb ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.411 [INFO][3400] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.412 [INFO][3400] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3b4d270d-c156-478b-8b7f-9097929b7e4d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d", Pod:"coredns-7db6d8ff4d-fgzmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6420a2dc8eb", MAC:"aa:1e:ec:6d:0d:55", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.433536 env[1190]: 2024-07-02 07:55:35.429 [INFO][3400] k8s.go 500: Wrote updated endpoint to datastore ContainerID="b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fgzmr" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:35.465022 systemd-networkd[999]: caliefaedfc17ff: Link UP Jul 2 07:55:35.466796 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliefaedfc17ff: link becomes ready Jul 2 07:55:35.467533 systemd-networkd[999]: caliefaedfc17ff: Gained carrier Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.206 [INFO][3413] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0 coredns-7db6d8ff4d- kube-system f1e8ceba-0a93-4a0f-99a3-13a5669851c6 737 0 2024-07-02 07:54:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-4df693d906 coredns-7db6d8ff4d-llckt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliefaedfc17ff [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.207 [INFO][3413] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.332 [INFO][3440] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" HandleID="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.359 [INFO][3440] ipam_plugin.go 264: Auto assigning IP ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" HandleID="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000295f60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-4df693d906", "pod":"coredns-7db6d8ff4d-llckt", "timestamp":"2024-07-02 07:55:35.332150041 +0000 UTC"}, Hostname:"ci-3510.3.5-a-4df693d906", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.359 [INFO][3440] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.387 [INFO][3440] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.387 [INFO][3440] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-4df693d906' Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.396 [INFO][3440] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.410 [INFO][3440] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.422 [INFO][3440] ipam.go 489: Trying affinity for 192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.426 [INFO][3440] ipam.go 155: Attempting to load block cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.433 [INFO][3440] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.433 [INFO][3440] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.0/26 handle="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.437 [INFO][3440] ipam.go 1685: Creating new handle: k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.445 [INFO][3440] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.0/26 handle="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.458 [INFO][3440] ipam.go 1216: Successfully claimed IPs: [192.168.38.3/26] block=192.168.38.0/26 handle="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.458 [INFO][3440] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.3/26] handle="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.458 [INFO][3440] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.491784 env[1190]: 2024-07-02 07:55:35.458 [INFO][3440] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.38.3/26] IPv6=[] ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" HandleID="k8s-pod-network.7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.462 [INFO][3413] k8s.go 386: Populated endpoint ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f1e8ceba-0a93-4a0f-99a3-13a5669851c6", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"", Pod:"coredns-7db6d8ff4d-llckt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliefaedfc17ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.462 [INFO][3413] k8s.go 387: Calico CNI using IPs: [192.168.38.3/32] ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.462 [INFO][3413] dataplane_linux.go 68: Setting the host side veth name to caliefaedfc17ff ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.466 [INFO][3413] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.473 [INFO][3413] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f1e8ceba-0a93-4a0f-99a3-13a5669851c6", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f", Pod:"coredns-7db6d8ff4d-llckt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliefaedfc17ff", MAC:"4e:01:b0:7e:f6:59", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.492970 env[1190]: 2024-07-02 07:55:35.487 [INFO][3413] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-llckt" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:35.499000 audit[3482]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:35.499000 audit[3482]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffcadf4e280 a2=0 a3=7ffcadf4e26c items=0 ppid=3017 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:35.509125 env[1190]: time="2024-07-02T07:55:35.508451700Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:35.509125 env[1190]: time="2024-07-02T07:55:35.508533648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:35.509125 env[1190]: time="2024-07-02T07:55:35.508551836Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:35.509897 env[1190]: time="2024-07-02T07:55:35.509772779Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d pid=3481 runtime=io.containerd.runc.v2 Jul 2 07:55:35.547126 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali94de90c47f2: link becomes ready Jul 2 07:55:35.546315 systemd-networkd[999]: cali94de90c47f2: Link UP Jul 2 07:55:35.551036 systemd-networkd[999]: cali94de90c47f2: Gained carrier Jul 2 07:55:35.560592 systemd[1]: Started cri-containerd-b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d.scope. Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.233 [INFO][3424] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0 csi-node-driver- calico-system 809a447d-7284-46e7-a8cf-14b6eb923d1e 740 0 2024-07-02 07:55:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-4df693d906 csi-node-driver-285st eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali94de90c47f2 [] []}} ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.233 [INFO][3424] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.352 [INFO][3445] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" HandleID="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.368 [INFO][3445] ipam_plugin.go 264: Auto assigning IP ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" HandleID="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bf350), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-4df693d906", "pod":"csi-node-driver-285st", "timestamp":"2024-07-02 07:55:35.352533333 +0000 UTC"}, Hostname:"ci-3510.3.5-a-4df693d906", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.368 [INFO][3445] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.459 [INFO][3445] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.459 [INFO][3445] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-4df693d906' Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.472 [INFO][3445] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.499 [INFO][3445] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.507 [INFO][3445] ipam.go 489: Trying affinity for 192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.511 [INFO][3445] ipam.go 155: Attempting to load block cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.515 [INFO][3445] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.515 [INFO][3445] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.0/26 handle="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.518 [INFO][3445] ipam.go 1685: Creating new handle: k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.526 [INFO][3445] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.0/26 handle="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.538 [INFO][3445] ipam.go 1216: Successfully claimed IPs: [192.168.38.4/26] block=192.168.38.0/26 handle="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.538 [INFO][3445] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.4/26] handle="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" host="ci-3510.3.5-a-4df693d906" Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.538 [INFO][3445] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:35.580199 env[1190]: 2024-07-02 07:55:35.538 [INFO][3445] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.38.4/26] IPv6=[] ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" HandleID="k8s-pod-network.88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.542 [INFO][3424] k8s.go 386: Populated endpoint ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"809a447d-7284-46e7-a8cf-14b6eb923d1e", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"", Pod:"csi-node-driver-285st", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali94de90c47f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.542 [INFO][3424] k8s.go 387: Calico CNI using IPs: [192.168.38.4/32] ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.542 [INFO][3424] dataplane_linux.go 68: Setting the host side veth name to cali94de90c47f2 ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.545 [INFO][3424] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.548 [INFO][3424] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"809a447d-7284-46e7-a8cf-14b6eb923d1e", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d", Pod:"csi-node-driver-285st", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali94de90c47f2", MAC:"8a:0b:2f:b9:70:4e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:35.581671 env[1190]: 2024-07-02 07:55:35.571 [INFO][3424] k8s.go 500: Wrote updated endpoint to datastore ContainerID="88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d" Namespace="calico-system" Pod="csi-node-driver-285st" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.593000 audit: BPF prog-id=150 op=LOAD Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3481 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232376432653335656431643562616638623437363331646338333432 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3481 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232376432653335656431643562616638623437363331646338333432 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit: BPF prog-id=151 op=LOAD Jul 2 07:55:35.595000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024810 items=0 ppid=3481 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232376432653335656431643562616638623437363331646338333432 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit: BPF prog-id=152 op=LOAD Jul 2 07:55:35.595000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024858 items=0 ppid=3481 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232376432653335656431643562616638623437363331646338333432 Jul 2 07:55:35.595000 audit: BPF prog-id=152 op=UNLOAD Jul 2 07:55:35.595000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.595000 audit: BPF prog-id=153 op=LOAD Jul 2 07:55:35.595000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024c68 items=0 ppid=3481 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232376432653335656431643562616638623437363331646338333432 Jul 2 07:55:35.610332 env[1190]: time="2024-07-02T07:55:35.607549596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:35.610332 env[1190]: time="2024-07-02T07:55:35.607606070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:35.610332 env[1190]: time="2024-07-02T07:55:35.607617869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:35.610332 env[1190]: time="2024-07-02T07:55:35.607779957Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f pid=3536 runtime=io.containerd.runc.v2 Jul 2 07:55:35.623931 systemd[1]: Started cri-containerd-7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f.scope. Jul 2 07:55:35.627000 audit[3532]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:35.627000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffebdcbbfc0 a2=0 a3=7ffebdcbbfac items=0 ppid=3017 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.627000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:35.639099 env[1190]: time="2024-07-02T07:55:35.638963086Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:35.639366 env[1190]: time="2024-07-02T07:55:35.639322451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:35.639551 env[1190]: time="2024-07-02T07:55:35.639511480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:35.639938 env[1190]: time="2024-07-02T07:55:35.639889440Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d pid=3565 runtime=io.containerd.runc.v2 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.669000 audit: BPF prog-id=154 op=LOAD Jul 2 07:55:35.670000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.670000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3536 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763636361626139386438336238613261636239663531646638383138 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3536 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763636361626139386438336238613261636239663531646638383138 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.671000 audit: BPF prog-id=155 op=LOAD Jul 2 07:55:35.671000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d8670 items=0 ppid=3536 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763636361626139386438336238613261636239663531646638383138 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.673000 audit: BPF prog-id=156 op=LOAD Jul 2 07:55:35.673000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d86b8 items=0 ppid=3536 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763636361626139386438336238613261636239663531646638383138 Jul 2 07:55:35.674000 audit: BPF prog-id=156 op=UNLOAD Jul 2 07:55:35.674000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.674000 audit: BPF prog-id=157 op=LOAD Jul 2 07:55:35.674000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d8ac8 items=0 ppid=3536 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763636361626139386438336238613261636239663531646638383138 Jul 2 07:55:35.703962 env[1190]: time="2024-07-02T07:55:35.703895444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fgzmr,Uid:3b4d270d-c156-478b-8b7f-9097929b7e4d,Namespace:kube-system,Attempt:1,} returns sandbox id \"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d\"" Jul 2 07:55:35.706250 kubelet[2021]: E0702 07:55:35.705386 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:35.709506 env[1190]: time="2024-07-02T07:55:35.709443986Z" level=info msg="CreateContainer within sandbox \"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:55:35.722327 systemd[1]: Started cri-containerd-88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d.scope. Jul 2 07:55:35.727000 audit[3598]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:35.727000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe2f0991c0 a2=0 a3=7ffe2f0991ac items=0 ppid=3017 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.727000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.752000 audit: BPF prog-id=158 op=LOAD Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3565 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636265633765356563336133383137616334613032393665313263 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3565 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636265633765356563336133383137616334613032393665313263 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.754000 audit: BPF prog-id=159 op=LOAD Jul 2 07:55:35.754000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000261ea0 items=0 ppid=3565 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636265633765356563336133383137616334613032393665313263 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit: BPF prog-id=160 op=LOAD Jul 2 07:55:35.757000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000261ee8 items=0 ppid=3565 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636265633765356563336133383137616334613032393665313263 Jul 2 07:55:35.757000 audit: BPF prog-id=160 op=UNLOAD Jul 2 07:55:35.757000 audit: BPF prog-id=159 op=UNLOAD Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.757000 audit: BPF prog-id=161 op=LOAD Jul 2 07:55:35.757000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c82f8 items=0 ppid=3565 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636265633765356563336133383137616334613032393665313263 Jul 2 07:55:35.760341 env[1190]: time="2024-07-02T07:55:35.755923542Z" level=info msg="CreateContainer within sandbox \"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"68aa964266ac6f095e99fde909e73bff4debea000fd25aa9f4c8742610580332\"" Jul 2 07:55:35.761599 env[1190]: time="2024-07-02T07:55:35.761555761Z" level=info msg="StartContainer for \"68aa964266ac6f095e99fde909e73bff4debea000fd25aa9f4c8742610580332\"" Jul 2 07:55:35.776849 env[1190]: time="2024-07-02T07:55:35.776789838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-llckt,Uid:f1e8ceba-0a93-4a0f-99a3-13a5669851c6,Namespace:kube-system,Attempt:1,} returns sandbox id \"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f\"" Jul 2 07:55:35.778507 kubelet[2021]: E0702 07:55:35.777839 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:35.784953 env[1190]: time="2024-07-02T07:55:35.784177864Z" level=info msg="CreateContainer within sandbox \"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:55:35.808451 env[1190]: time="2024-07-02T07:55:35.808383617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-285st,Uid:809a447d-7284-46e7-a8cf-14b6eb923d1e,Namespace:calico-system,Attempt:1,} returns sandbox id \"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d\"" Jul 2 07:55:35.821151 systemd[1]: Started cri-containerd-68aa964266ac6f095e99fde909e73bff4debea000fd25aa9f4c8742610580332.scope. Jul 2 07:55:35.837964 env[1190]: time="2024-07-02T07:55:35.837907039Z" level=info msg="CreateContainer within sandbox \"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1081faef3cdd7249c80f138af72cb244075776d510d2c137a45161d95a3e1c30\"" Jul 2 07:55:35.839552 env[1190]: time="2024-07-02T07:55:35.839474726Z" level=info msg="StartContainer for \"1081faef3cdd7249c80f138af72cb244075776d510d2c137a45161d95a3e1c30\"" Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.853000 audit: BPF prog-id=162 op=LOAD Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3481 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638616139363432363661633666303935653939666465393039653733 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3481 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638616139363432363661633666303935653939666465393039653733 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit: BPF prog-id=163 op=LOAD Jul 2 07:55:35.855000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dd5a0 items=0 ppid=3481 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638616139363432363661633666303935653939666465393039653733 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit: BPF prog-id=164 op=LOAD Jul 2 07:55:35.855000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dd5e8 items=0 ppid=3481 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638616139363432363661633666303935653939666465393039653733 Jul 2 07:55:35.855000 audit: BPF prog-id=164 op=UNLOAD Jul 2 07:55:35.855000 audit: BPF prog-id=163 op=UNLOAD Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.855000 audit: BPF prog-id=165 op=LOAD Jul 2 07:55:35.855000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dd9f8 items=0 ppid=3481 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638616139363432363661633666303935653939666465393039653733 Jul 2 07:55:35.883608 systemd[1]: Started cri-containerd-1081faef3cdd7249c80f138af72cb244075776d510d2c137a45161d95a3e1c30.scope. Jul 2 07:55:35.887831 systemd-networkd[999]: caliaeff696b167: Gained IPv6LL Jul 2 07:55:35.905881 env[1190]: time="2024-07-02T07:55:35.905819705Z" level=info msg="StartContainer for \"68aa964266ac6f095e99fde909e73bff4debea000fd25aa9f4c8742610580332\" returns successfully" Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.931000 audit: BPF prog-id=166 op=LOAD Jul 2 07:55:35.933000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.933000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3536 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383166616566336364643732343963383066313338616637326362 Jul 2 07:55:35.933000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.933000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3536 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383166616566336364643732343963383066313338616637326362 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.934000 audit: BPF prog-id=167 op=LOAD Jul 2 07:55:35.934000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003289c0 items=0 ppid=3536 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383166616566336364643732343963383066313338616637326362 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.935000 audit: BPF prog-id=168 op=LOAD Jul 2 07:55:35.935000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000328a08 items=0 ppid=3536 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383166616566336364643732343963383066313338616637326362 Jul 2 07:55:35.936000 audit: BPF prog-id=168 op=UNLOAD Jul 2 07:55:35.936000 audit: BPF prog-id=167 op=UNLOAD Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:35.936000 audit: BPF prog-id=169 op=LOAD Jul 2 07:55:35.936000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000328e18 items=0 ppid=3536 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383166616566336364643732343963383066313338616637326362 Jul 2 07:55:35.974378 env[1190]: time="2024-07-02T07:55:35.974300196Z" level=info msg="StartContainer for \"1081faef3cdd7249c80f138af72cb244075776d510d2c137a45161d95a3e1c30\" returns successfully" Jul 2 07:55:36.009836 systemd[1]: run-netns-cni\x2d1022cb20\x2deeab\x2d977b\x2d672b\x2dcb78b97d25c4.mount: Deactivated successfully. Jul 2 07:55:36.100485 kubelet[2021]: E0702 07:55:36.100451 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:36.110404 kubelet[2021]: E0702 07:55:36.109988 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:36.292656 kubelet[2021]: I0702 07:55:36.290148 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-llckt" podStartSLOduration=37.290123847 podStartE2EDuration="37.290123847s" podCreationTimestamp="2024-07-02 07:54:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:36.289934695 +0000 UTC m=+51.807230502" watchObservedRunningTime="2024-07-02 07:55:36.290123847 +0000 UTC m=+51.807419688" Jul 2 07:55:36.293241 kubelet[2021]: I0702 07:55:36.293039 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-fgzmr" podStartSLOduration=37.293011564 podStartE2EDuration="37.293011564s" podCreationTimestamp="2024-07-02 07:54:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:36.145999412 +0000 UTC m=+51.663295220" watchObservedRunningTime="2024-07-02 07:55:36.293011564 +0000 UTC m=+51.810307362" Jul 2 07:55:36.316000 audit[3701]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.316000 audit[3701]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe19b24670 a2=0 a3=7ffe19b2465c items=0 ppid=2212 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:36.316000 audit[3701]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.316000 audit[3701]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe19b24670 a2=0 a3=0 items=0 ppid=2212 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:36.354000 audit[3703]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.354000 audit[3703]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd7640b060 a2=0 a3=7ffd7640b04c items=0 ppid=2212 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:36.355000 audit[3703]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.355000 audit[3703]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd7640b060 a2=0 a3=0 items=0 ppid=2212 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:36.781597 systemd-networkd[999]: caliefaedfc17ff: Gained IPv6LL Jul 2 07:55:37.113135 kubelet[2021]: E0702 07:55:37.113086 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:37.115907 kubelet[2021]: E0702 07:55:37.114651 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:37.252622 systemd-networkd[999]: cali94de90c47f2: Gained IPv6LL Jul 2 07:55:37.278614 kernel: kauditd_printk_skb: 480 callbacks suppressed Jul 2 07:55:37.280898 kernel: audit: type=1325 audit(1719906937.273:1160): table=filter:109 family=2 entries=11 op=nft_register_rule pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:37.281023 kernel: audit: type=1300 audit(1719906937.273:1160): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd552e8440 a2=0 a3=7ffd552e842c items=0 ppid=2212 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.273000 audit[3706]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:37.273000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd552e8440 a2=0 a3=7ffd552e842c items=0 ppid=2212 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:37.291614 kernel: audit: type=1327 audit(1719906937.273:1160): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:37.296953 env[1190]: time="2024-07-02T07:55:37.296115566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:37.297907 env[1190]: time="2024-07-02T07:55:37.297865767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:37.299752 env[1190]: time="2024-07-02T07:55:37.299693928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:37.301784 env[1190]: time="2024-07-02T07:55:37.301741934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:37.302263 env[1190]: time="2024-07-02T07:55:37.302232781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:55:37.307455 env[1190]: time="2024-07-02T07:55:37.306637958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:55:37.335455 kernel: audit: type=1325 audit(1719906937.331:1161): table=nat:110 family=2 entries=47 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:37.331000 audit[3706]: NETFILTER_CFG table=nat:110 family=2 entries=47 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:37.335677 env[1190]: time="2024-07-02T07:55:37.335598244Z" level=info msg="CreateContainer within sandbox \"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:55:37.331000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd552e8440 a2=0 a3=7ffd552e842c items=0 ppid=2212 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.352180 kernel: audit: type=1300 audit(1719906937.331:1161): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd552e8440 a2=0 a3=7ffd552e842c items=0 ppid=2212 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.352387 kernel: audit: type=1327 audit(1719906937.331:1161): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:37.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:37.355639 systemd-networkd[999]: cali6420a2dc8eb: Gained IPv6LL Jul 2 07:55:37.431452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1985730237.mount: Deactivated successfully. Jul 2 07:55:37.432681 env[1190]: time="2024-07-02T07:55:37.432570388Z" level=info msg="CreateContainer within sandbox \"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2\"" Jul 2 07:55:37.433817 env[1190]: time="2024-07-02T07:55:37.433770249Z" level=info msg="StartContainer for \"10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2\"" Jul 2 07:55:37.473483 systemd[1]: Started cri-containerd-10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2.scope. Jul 2 07:55:37.505264 kernel: audit: type=1400 audit(1719906937.495:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.505467 kernel: audit: type=1400 audit(1719906937.495:1163): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.509485 kernel: audit: type=1400 audit(1719906937.495:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.513456 kernel: audit: type=1400 audit(1719906937.495:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.496000 audit: BPF prog-id=170 op=LOAD Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=3289 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633563613335646432343430323064373838383331366337616663 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=3289 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633563613335646432343430323064373838383331366337616663 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.500000 audit: BPF prog-id=171 op=LOAD Jul 2 07:55:37.500000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0003f4100 items=0 ppid=3289 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633563613335646432343430323064373838383331366337616663 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit: BPF prog-id=172 op=LOAD Jul 2 07:55:37.504000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0003f4148 items=0 ppid=3289 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633563613335646432343430323064373838383331366337616663 Jul 2 07:55:37.504000 audit: BPF prog-id=172 op=UNLOAD Jul 2 07:55:37.504000 audit: BPF prog-id=171 op=UNLOAD Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:37.504000 audit: BPF prog-id=173 op=LOAD Jul 2 07:55:37.504000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0003f4558 items=0 ppid=3289 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633563613335646432343430323064373838383331366337616663 Jul 2 07:55:37.560469 env[1190]: time="2024-07-02T07:55:37.560288227Z" level=info msg="StartContainer for \"10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2\" returns successfully" Jul 2 07:55:38.117398 kubelet[2021]: E0702 07:55:38.117354 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:38.120828 kubelet[2021]: E0702 07:55:38.120789 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:38.344250 kubelet[2021]: I0702 07:55:38.344136 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74c68885cb-nhgvm" podStartSLOduration=27.444764065 podStartE2EDuration="30.344081783s" podCreationTimestamp="2024-07-02 07:55:08 +0000 UTC" firstStartedPulling="2024-07-02 07:55:34.40555732 +0000 UTC m=+49.922853094" lastFinishedPulling="2024-07-02 07:55:37.30487504 +0000 UTC m=+52.822170812" observedRunningTime="2024-07-02 07:55:38.191986244 +0000 UTC m=+53.709282041" watchObservedRunningTime="2024-07-02 07:55:38.344081783 +0000 UTC m=+53.861377595" Jul 2 07:55:38.409000 audit[3776]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3776 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:38.409000 audit[3776]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff50a3d6b0 a2=0 a3=7fff50a3d69c items=0 ppid=2212 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:38.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:38.413000 audit[3776]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3776 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:38.413000 audit[3776]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff50a3d6b0 a2=0 a3=7fff50a3d69c items=0 ppid=2212 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:38.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:38.433095 systemd[1]: Started sshd@8-137.184.188.4:22-147.75.109.163:34990.service. Jul 2 07:55:38.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.188.4:22-147.75.109.163:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.523150 sshd[3778]: Accepted publickey for core from 147.75.109.163 port 34990 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:38.521000 audit[3778]: USER_ACCT pid=3778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:38.524000 audit[3778]: CRED_ACQ pid=3778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:38.524000 audit[3778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd1469cb0 a2=3 a3=0 items=0 ppid=1 pid=3778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:38.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:38.531512 sshd[3778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:38.540926 systemd[1]: Started session-8.scope. Jul 2 07:55:38.541866 systemd-logind[1180]: New session 8 of user core. Jul 2 07:55:38.555000 audit[3778]: USER_START pid=3778 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:38.559000 audit[3780]: CRED_ACQ pid=3780 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:38.858556 env[1190]: time="2024-07-02T07:55:38.858492905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:38.860684 env[1190]: time="2024-07-02T07:55:38.860623737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:38.863681 env[1190]: time="2024-07-02T07:55:38.862836936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:38.867047 env[1190]: time="2024-07-02T07:55:38.866155239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:38.867047 env[1190]: time="2024-07-02T07:55:38.866546313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:55:38.872076 env[1190]: time="2024-07-02T07:55:38.872020101Z" level=info msg="CreateContainer within sandbox \"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:55:38.900616 env[1190]: time="2024-07-02T07:55:38.900560056Z" level=info msg="CreateContainer within sandbox \"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"07c6937eb02d9a6b97de30b3808bf07128b54d49126c9893f98cf0761352515b\"" Jul 2 07:55:38.902002 env[1190]: time="2024-07-02T07:55:38.901916299Z" level=info msg="StartContainer for \"07c6937eb02d9a6b97de30b3808bf07128b54d49126c9893f98cf0761352515b\"" Jul 2 07:55:38.956244 systemd[1]: Started cri-containerd-07c6937eb02d9a6b97de30b3808bf07128b54d49126c9893f98cf0761352515b.scope. Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fe4da1b4968 items=0 ppid=3565 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:39.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633639333765623032643961366239376465333062333830386266 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit: BPF prog-id=174 op=LOAD Jul 2 07:55:39.024000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001f7d58 items=0 ppid=3565 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:39.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633639333765623032643961366239376465333062333830386266 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit: BPF prog-id=175 op=LOAD Jul 2 07:55:39.024000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001f7da8 items=0 ppid=3565 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:39.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633639333765623032643961366239376465333062333830386266 Jul 2 07:55:39.024000 audit: BPF prog-id=175 op=UNLOAD Jul 2 07:55:39.024000 audit: BPF prog-id=174 op=UNLOAD Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:39.024000 audit: BPF prog-id=176 op=LOAD Jul 2 07:55:39.024000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001f7e38 items=0 ppid=3565 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:39.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633639333765623032643961366239376465333062333830386266 Jul 2 07:55:39.069627 env[1190]: time="2024-07-02T07:55:39.069567668Z" level=info msg="StartContainer for \"07c6937eb02d9a6b97de30b3808bf07128b54d49126c9893f98cf0761352515b\" returns successfully" Jul 2 07:55:39.071097 env[1190]: time="2024-07-02T07:55:39.071043587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:55:39.124726 kubelet[2021]: E0702 07:55:39.124579 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:39.169541 sshd[3778]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:39.169000 audit[3778]: USER_END pid=3778 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:39.169000 audit[3778]: CRED_DISP pid=3778 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:39.173013 systemd-logind[1180]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:55:39.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.188.4:22-147.75.109.163:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:39.173987 systemd[1]: sshd@8-137.184.188.4:22-147.75.109.163:34990.service: Deactivated successfully. Jul 2 07:55:39.175005 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:55:39.176211 systemd-logind[1180]: Removed session 8. Jul 2 07:55:39.298000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:39.298000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:39.298000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f79590 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:39.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:39.298000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015624e0 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:39.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:39.314962 systemd[1]: run-containerd-runc-k8s.io-07c6937eb02d9a6b97de30b3808bf07128b54d49126c9893f98cf0761352515b-runc.XjOZav.mount: Deactivated successfully. Jul 2 07:55:40.481000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.481000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.481000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00751e780 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.481000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00bb21bc0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.483000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.483000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c007f26000 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.489000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.489000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00751ec30 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.490000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.490000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bb21cb0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.492000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:40.492000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c008ad31e0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:55:40.492000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:55:40.656353 env[1190]: time="2024-07-02T07:55:40.656268301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.659467 env[1190]: time="2024-07-02T07:55:40.659375850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.661812 env[1190]: time="2024-07-02T07:55:40.661750900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.664627 env[1190]: time="2024-07-02T07:55:40.664553665Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.666175 env[1190]: time="2024-07-02T07:55:40.665398758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:55:40.669953 env[1190]: time="2024-07-02T07:55:40.669767362Z" level=info msg="CreateContainer within sandbox \"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:55:40.692310 env[1190]: time="2024-07-02T07:55:40.692224589Z" level=info msg="CreateContainer within sandbox \"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ce909e5096986f1bd9aa6ce964feda5b6f38934cc3dc4422bb6eb26d905aa213\"" Jul 2 07:55:40.693661 env[1190]: time="2024-07-02T07:55:40.693598713Z" level=info msg="StartContainer for \"ce909e5096986f1bd9aa6ce964feda5b6f38934cc3dc4422bb6eb26d905aa213\"" Jul 2 07:55:40.742271 systemd[1]: Started cri-containerd-ce909e5096986f1bd9aa6ce964feda5b6f38934cc3dc4422bb6eb26d905aa213.scope. Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fac352d6cc8 items=0 ppid=3565 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:40.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393039653530393639383666316264396161366365393634666564 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit: BPF prog-id=177 op=LOAD Jul 2 07:55:40.834000 audit[3828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027bc58 items=0 ppid=3565 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:40.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393039653530393639383666316264396161366365393634666564 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit: BPF prog-id=178 op=LOAD Jul 2 07:55:40.834000 audit[3828]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027bca8 items=0 ppid=3565 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:40.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393039653530393639383666316264396161366365393634666564 Jul 2 07:55:40.834000 audit: BPF prog-id=178 op=UNLOAD Jul 2 07:55:40.834000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { perfmon } for pid=3828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit[3828]: AVC avc: denied { bpf } for pid=3828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:40.834000 audit: BPF prog-id=179 op=LOAD Jul 2 07:55:40.834000 audit[3828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027bd38 items=0 ppid=3565 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:40.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393039653530393639383666316264396161366365393634666564 Jul 2 07:55:40.881920 env[1190]: time="2024-07-02T07:55:40.881831450Z" level=info msg="StartContainer for \"ce909e5096986f1bd9aa6ce964feda5b6f38934cc3dc4422bb6eb26d905aa213\" returns successfully" Jul 2 07:55:40.997258 kubelet[2021]: I0702 07:55:40.997074 2021 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:55:40.999817 kubelet[2021]: I0702 07:55:40.999738 2021 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:55:41.144751 kubelet[2021]: I0702 07:55:41.144673 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-285st" podStartSLOduration=28.289989548 podStartE2EDuration="33.144637241s" podCreationTimestamp="2024-07-02 07:55:08 +0000 UTC" firstStartedPulling="2024-07-02 07:55:35.81276351 +0000 UTC m=+51.330059284" lastFinishedPulling="2024-07-02 07:55:40.667411172 +0000 UTC m=+56.184706977" observedRunningTime="2024-07-02 07:55:41.144189955 +0000 UTC m=+56.661485759" watchObservedRunningTime="2024-07-02 07:55:41.144637241 +0000 UTC m=+56.661933043" Jul 2 07:55:41.683803 systemd[1]: run-containerd-runc-k8s.io-ce909e5096986f1bd9aa6ce964feda5b6f38934cc3dc4422bb6eb26d905aa213-runc.1v9fYG.mount: Deactivated successfully. Jul 2 07:55:44.179120 systemd[1]: Started sshd@9-137.184.188.4:22-147.75.109.163:52974.service. Jul 2 07:55:44.187655 kernel: kauditd_printk_skb: 180 callbacks suppressed Jul 2 07:55:44.187881 kernel: audit: type=1130 audit(1719906944.178:1211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.188.4:22-147.75.109.163:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.188.4:22-147.75.109.163:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.263000 audit[3871]: USER_ACCT pid=3871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.271377 sshd[3871]: Accepted publickey for core from 147.75.109.163 port 52974 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:44.271866 kernel: audit: type=1101 audit(1719906944.263:1212): pid=3871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.271000 audit[3871]: CRED_ACQ pid=3871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.283843 kernel: audit: type=1103 audit(1719906944.271:1213): pid=3871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.284042 kernel: audit: type=1006 audit(1719906944.271:1214): pid=3871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 2 07:55:44.271000 audit[3871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff115d52a0 a2=3 a3=0 items=0 ppid=1 pid=3871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.290364 kernel: audit: type=1300 audit(1719906944.271:1214): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff115d52a0 a2=3 a3=0 items=0 ppid=1 pid=3871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:44.293563 kernel: audit: type=1327 audit(1719906944.271:1214): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:44.293600 sshd[3871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:44.300676 systemd-logind[1180]: New session 9 of user core. Jul 2 07:55:44.302149 systemd[1]: Started session-9.scope. Jul 2 07:55:44.310000 audit[3871]: USER_START pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.319611 kernel: audit: type=1105 audit(1719906944.310:1215): pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.318000 audit[3873]: CRED_ACQ pid=3873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.326569 kernel: audit: type=1103 audit(1719906944.318:1216): pid=3873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.613719 sshd[3871]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:44.615000 audit[3871]: USER_END pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.623469 kernel: audit: type=1106 audit(1719906944.615:1217): pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.621000 audit[3871]: CRED_DISP pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.629474 kernel: audit: type=1104 audit(1719906944.621:1218): pid=3871 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:44.630459 systemd[1]: sshd@9-137.184.188.4:22-147.75.109.163:52974.service: Deactivated successfully. Jul 2 07:55:44.631519 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:55:44.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.188.4:22-147.75.109.163:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.632656 systemd-logind[1180]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:55:44.634070 systemd-logind[1180]: Removed session 9. Jul 2 07:55:44.690778 env[1190]: time="2024-07-02T07:55:44.690692222Z" level=info msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.799 [WARNING][3895] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0", GenerateName:"calico-kube-controllers-74c68885cb-", Namespace:"calico-system", SelfLink:"", UID:"c50a85f4-3220-4849-8b2a-39fb87d854f9", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74c68885cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135", Pod:"calico-kube-controllers-74c68885cb-nhgvm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaeff696b167", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.800 [INFO][3895] k8s.go 608: Cleaning up netns ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.800 [INFO][3895] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" iface="eth0" netns="" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.801 [INFO][3895] k8s.go 615: Releasing IP address(es) ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.801 [INFO][3895] utils.go 188: Calico CNI releasing IP address ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.855 [INFO][3901] ipam_plugin.go 411: Releasing address using handleID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.856 [INFO][3901] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.856 [INFO][3901] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.865 [WARNING][3901] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.865 [INFO][3901] ipam_plugin.go 439: Releasing address using workloadID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.871 [INFO][3901] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:44.879944 env[1190]: 2024-07-02 07:55:44.875 [INFO][3895] k8s.go 621: Teardown processing complete. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:44.879944 env[1190]: time="2024-07-02T07:55:44.878827250Z" level=info msg="TearDown network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" successfully" Jul 2 07:55:44.879944 env[1190]: time="2024-07-02T07:55:44.878869043Z" level=info msg="StopPodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" returns successfully" Jul 2 07:55:44.879944 env[1190]: time="2024-07-02T07:55:44.879739936Z" level=info msg="RemovePodSandbox for \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" Jul 2 07:55:44.879944 env[1190]: time="2024-07-02T07:55:44.879812858Z" level=info msg="Forcibly stopping sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\"" Jul 2 07:55:44.882000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.882000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107fc80 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:44.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:44.887000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.887000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016e3320 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:44.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:44.887000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.887000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016e3620 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:44.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:44.887000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.887000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016e3640 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:55:44.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:44.975 [WARNING][3922] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0", GenerateName:"calico-kube-controllers-74c68885cb-", Namespace:"calico-system", SelfLink:"", UID:"c50a85f4-3220-4849-8b2a-39fb87d854f9", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74c68885cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"0bea6d085ccc0161d4db5a0cb0f70838190b8ab1408f316dd849f23865ead135", Pod:"calico-kube-controllers-74c68885cb-nhgvm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaeff696b167", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:44.976 [INFO][3922] k8s.go 608: Cleaning up netns ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:44.976 [INFO][3922] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" iface="eth0" netns="" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:44.976 [INFO][3922] k8s.go 615: Releasing IP address(es) ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:44.976 [INFO][3922] utils.go 188: Calico CNI releasing IP address ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.046 [INFO][3928] ipam_plugin.go 411: Releasing address using handleID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.046 [INFO][3928] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.046 [INFO][3928] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.061 [WARNING][3928] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.061 [INFO][3928] ipam_plugin.go 439: Releasing address using workloadID ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" HandleID="k8s-pod-network.49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--kube--controllers--74c68885cb--nhgvm-eth0" Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.064 [INFO][3928] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.067695 env[1190]: 2024-07-02 07:55:45.066 [INFO][3922] k8s.go 621: Teardown processing complete. ContainerID="49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab" Jul 2 07:55:45.067695 env[1190]: time="2024-07-02T07:55:45.067681101Z" level=info msg="TearDown network for sandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" successfully" Jul 2 07:55:45.071283 env[1190]: time="2024-07-02T07:55:45.071218673Z" level=info msg="RemovePodSandbox \"49ee0160517bf834c881334c7c612ac0aa4bc8701846edbe8f2050f21a27faab\" returns successfully" Jul 2 07:55:45.072136 env[1190]: time="2024-07-02T07:55:45.072091108Z" level=info msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.158 [WARNING][3948] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"809a447d-7284-46e7-a8cf-14b6eb923d1e", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d", Pod:"csi-node-driver-285st", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali94de90c47f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.164 [INFO][3948] k8s.go 608: Cleaning up netns ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.165 [INFO][3948] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" iface="eth0" netns="" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.165 [INFO][3948] k8s.go 615: Releasing IP address(es) ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.165 [INFO][3948] utils.go 188: Calico CNI releasing IP address ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.242 [INFO][3955] ipam_plugin.go 411: Releasing address using handleID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.243 [INFO][3955] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.243 [INFO][3955] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.256 [WARNING][3955] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.256 [INFO][3955] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.263 [INFO][3955] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.269860 env[1190]: 2024-07-02 07:55:45.265 [INFO][3948] k8s.go 621: Teardown processing complete. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.269860 env[1190]: time="2024-07-02T07:55:45.269781216Z" level=info msg="TearDown network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" successfully" Jul 2 07:55:45.269860 env[1190]: time="2024-07-02T07:55:45.269817481Z" level=info msg="StopPodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" returns successfully" Jul 2 07:55:45.270812 env[1190]: time="2024-07-02T07:55:45.270485280Z" level=info msg="RemovePodSandbox for \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" Jul 2 07:55:45.270812 env[1190]: time="2024-07-02T07:55:45.270536700Z" level=info msg="Forcibly stopping sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\"" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.369 [WARNING][3976] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"809a447d-7284-46e7-a8cf-14b6eb923d1e", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"88cbec7e5ec3a3817ac4a0296e12cab7035116a4cce3a796edc4f2295f299a6d", Pod:"csi-node-driver-285st", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali94de90c47f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.369 [INFO][3976] k8s.go 608: Cleaning up netns ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.369 [INFO][3976] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" iface="eth0" netns="" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.369 [INFO][3976] k8s.go 615: Releasing IP address(es) ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.370 [INFO][3976] utils.go 188: Calico CNI releasing IP address ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.406 [INFO][3982] ipam_plugin.go 411: Releasing address using handleID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.407 [INFO][3982] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.407 [INFO][3982] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.418 [WARNING][3982] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.418 [INFO][3982] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" HandleID="k8s-pod-network.f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Workload="ci--3510.3.5--a--4df693d906-k8s-csi--node--driver--285st-eth0" Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.421 [INFO][3982] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.426805 env[1190]: 2024-07-02 07:55:45.424 [INFO][3976] k8s.go 621: Teardown processing complete. ContainerID="f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65" Jul 2 07:55:45.427700 env[1190]: time="2024-07-02T07:55:45.426846445Z" level=info msg="TearDown network for sandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" successfully" Jul 2 07:55:45.434125 env[1190]: time="2024-07-02T07:55:45.434043347Z" level=info msg="RemovePodSandbox \"f619241234cdfa68c6abdd6939301b14ca0465e4e18b13526987a065a5b58c65\" returns successfully" Jul 2 07:55:45.435213 env[1190]: time="2024-07-02T07:55:45.435157846Z" level=info msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.500 [WARNING][4003] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3b4d270d-c156-478b-8b7f-9097929b7e4d", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d", Pod:"coredns-7db6d8ff4d-fgzmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6420a2dc8eb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.500 [INFO][4003] k8s.go 608: Cleaning up netns ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.500 [INFO][4003] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" iface="eth0" netns="" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.500 [INFO][4003] k8s.go 615: Releasing IP address(es) ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.500 [INFO][4003] utils.go 188: Calico CNI releasing IP address ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.531 [INFO][4009] ipam_plugin.go 411: Releasing address using handleID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.531 [INFO][4009] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.531 [INFO][4009] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.547 [WARNING][4009] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.547 [INFO][4009] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.550 [INFO][4009] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.555825 env[1190]: 2024-07-02 07:55:45.553 [INFO][4003] k8s.go 621: Teardown processing complete. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.556688 env[1190]: time="2024-07-02T07:55:45.556645754Z" level=info msg="TearDown network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" successfully" Jul 2 07:55:45.556785 env[1190]: time="2024-07-02T07:55:45.556768113Z" level=info msg="StopPodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" returns successfully" Jul 2 07:55:45.557882 env[1190]: time="2024-07-02T07:55:45.557791803Z" level=info msg="RemovePodSandbox for \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" Jul 2 07:55:45.557882 env[1190]: time="2024-07-02T07:55:45.557849180Z" level=info msg="Forcibly stopping sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\"" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.630 [WARNING][4029] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3b4d270d-c156-478b-8b7f-9097929b7e4d", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"b27d2e35ed1d5baf8b47631dc834288542437d2fb3a0b5d255ed5fbdfe7c6e1d", Pod:"coredns-7db6d8ff4d-fgzmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6420a2dc8eb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.630 [INFO][4029] k8s.go 608: Cleaning up netns ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.630 [INFO][4029] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" iface="eth0" netns="" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.631 [INFO][4029] k8s.go 615: Releasing IP address(es) ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.631 [INFO][4029] utils.go 188: Calico CNI releasing IP address ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.662 [INFO][4035] ipam_plugin.go 411: Releasing address using handleID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.662 [INFO][4035] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.663 [INFO][4035] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.675 [WARNING][4035] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.675 [INFO][4035] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" HandleID="k8s-pod-network.7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--fgzmr-eth0" Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.678 [INFO][4035] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.681763 env[1190]: 2024-07-02 07:55:45.680 [INFO][4029] k8s.go 621: Teardown processing complete. ContainerID="7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97" Jul 2 07:55:45.682650 env[1190]: time="2024-07-02T07:55:45.682594737Z" level=info msg="TearDown network for sandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" successfully" Jul 2 07:55:45.688822 env[1190]: time="2024-07-02T07:55:45.688769626Z" level=info msg="RemovePodSandbox \"7032a14998e90f3789865a933941845ca2c99b0494e720728c358cd43abbca97\" returns successfully" Jul 2 07:55:45.689803 env[1190]: time="2024-07-02T07:55:45.689758860Z" level=info msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.784 [WARNING][4056] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f1e8ceba-0a93-4a0f-99a3-13a5669851c6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f", Pod:"coredns-7db6d8ff4d-llckt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliefaedfc17ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.785 [INFO][4056] k8s.go 608: Cleaning up netns ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.785 [INFO][4056] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" iface="eth0" netns="" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.785 [INFO][4056] k8s.go 615: Releasing IP address(es) ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.785 [INFO][4056] utils.go 188: Calico CNI releasing IP address ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.823 [INFO][4065] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.823 [INFO][4065] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.823 [INFO][4065] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.833 [WARNING][4065] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.833 [INFO][4065] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.836 [INFO][4065] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.840574 env[1190]: 2024-07-02 07:55:45.839 [INFO][4056] k8s.go 621: Teardown processing complete. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.841569 env[1190]: time="2024-07-02T07:55:45.841516968Z" level=info msg="TearDown network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" successfully" Jul 2 07:55:45.841659 env[1190]: time="2024-07-02T07:55:45.841642523Z" level=info msg="StopPodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" returns successfully" Jul 2 07:55:45.843782 env[1190]: time="2024-07-02T07:55:45.843740789Z" level=info msg="RemovePodSandbox for \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" Jul 2 07:55:45.844137 env[1190]: time="2024-07-02T07:55:45.844019941Z" level=info msg="Forcibly stopping sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\"" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.903 [WARNING][4084] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f1e8ceba-0a93-4a0f-99a3-13a5669851c6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"7cccaba98d83b8a2acb9f51df88187864c1d3d240309d140cf9eee480ed31d5f", Pod:"coredns-7db6d8ff4d-llckt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliefaedfc17ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.906 [INFO][4084] k8s.go 608: Cleaning up netns ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.906 [INFO][4084] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" iface="eth0" netns="" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.906 [INFO][4084] k8s.go 615: Releasing IP address(es) ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.906 [INFO][4084] utils.go 188: Calico CNI releasing IP address ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.933 [INFO][4090] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.933 [INFO][4090] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.933 [INFO][4090] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.943 [WARNING][4090] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.943 [INFO][4090] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" HandleID="k8s-pod-network.8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Workload="ci--3510.3.5--a--4df693d906-k8s-coredns--7db6d8ff4d--llckt-eth0" Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.947 [INFO][4090] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:45.951359 env[1190]: 2024-07-02 07:55:45.949 [INFO][4084] k8s.go 621: Teardown processing complete. ContainerID="8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309" Jul 2 07:55:45.952740 env[1190]: time="2024-07-02T07:55:45.951973804Z" level=info msg="TearDown network for sandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" successfully" Jul 2 07:55:45.957156 env[1190]: time="2024-07-02T07:55:45.957042612Z" level=info msg="RemovePodSandbox \"8c4efb106283e1c7a5437e701b2a3fcd43fc412d070343fd5efbea25fda21309\" returns successfully" Jul 2 07:55:48.536739 systemd[1]: run-containerd-runc-k8s.io-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1-runc.hrlMtD.mount: Deactivated successfully. Jul 2 07:55:48.611499 kubelet[2021]: E0702 07:55:48.611173 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:55:49.621300 systemd[1]: Started sshd@10-137.184.188.4:22-147.75.109.163:52990.service. Jul 2 07:55:49.629052 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:55:49.629236 kernel: audit: type=1130 audit(1719906949.621:1224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.188.4:22-147.75.109.163:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.188.4:22-147.75.109.163:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.696469 kernel: audit: type=1101 audit(1719906949.689:1225): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.689000 audit[4119]: USER_ACCT pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.696973 sshd[4119]: Accepted publickey for core from 147.75.109.163 port 52990 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:49.697000 audit[4119]: CRED_ACQ pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.707248 kernel: audit: type=1103 audit(1719906949.697:1226): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.707600 kernel: audit: type=1006 audit(1719906949.699:1227): pid=4119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 07:55:49.707649 kernel: audit: type=1300 audit(1719906949.699:1227): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3ff36880 a2=3 a3=0 items=0 ppid=1 pid=4119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:49.699000 audit[4119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3ff36880 a2=3 a3=0 items=0 ppid=1 pid=4119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:49.712721 kernel: audit: type=1327 audit(1719906949.699:1227): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:49.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:49.713405 sshd[4119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:49.727601 systemd-logind[1180]: New session 10 of user core. Jul 2 07:55:49.727876 systemd[1]: Started session-10.scope. Jul 2 07:55:49.734000 audit[4119]: USER_START pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.744272 kernel: audit: type=1105 audit(1719906949.734:1228): pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.744897 kernel: audit: type=1103 audit(1719906949.742:1229): pid=4121 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.742000 audit[4121]: CRED_ACQ pid=4121 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.930769 sshd[4119]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:49.931000 audit[4119]: USER_END pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.940555 kernel: audit: type=1106 audit(1719906949.931:1230): pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.940801 systemd[1]: sshd@10-137.184.188.4:22-147.75.109.163:52990.service: Deactivated successfully. Jul 2 07:55:49.942168 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:55:49.931000 audit[4119]: CRED_DISP pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.949737 kernel: audit: type=1104 audit(1719906949.931:1231): pid=4119 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.188.4:22-147.75.109.163:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.950255 systemd-logind[1180]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:55:49.952868 systemd-logind[1180]: Removed session 10. Jul 2 07:55:54.938209 systemd[1]: Started sshd@11-137.184.188.4:22-147.75.109.163:38622.service. Jul 2 07:55:54.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.188.4:22-147.75.109.163:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:54.939551 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:54.939657 kernel: audit: type=1130 audit(1719906954.937:1233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.188.4:22-147.75.109.163:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:54.996000 audit[4162]: USER_ACCT pid=4162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.002818 sshd[4162]: Accepted publickey for core from 147.75.109.163 port 38622 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:55.003456 kernel: audit: type=1101 audit(1719906954.996:1234): pid=4162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.006000 audit[4162]: CRED_ACQ pid=4162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.013698 sshd[4162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:55.016171 kernel: audit: type=1103 audit(1719906955.006:1235): pid=4162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.017046 kernel: audit: type=1006 audit(1719906955.006:1236): pid=4162 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 07:55:55.006000 audit[4162]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5422fbf0 a2=3 a3=0 items=0 ppid=1 pid=4162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:55.024711 kernel: audit: type=1300 audit(1719906955.006:1236): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5422fbf0 a2=3 a3=0 items=0 ppid=1 pid=4162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:55.023760 systemd[1]: Started session-11.scope. Jul 2 07:55:55.025533 systemd-logind[1180]: New session 11 of user core. Jul 2 07:55:55.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:55.031550 kernel: audit: type=1327 audit(1719906955.006:1236): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:55.049392 kernel: audit: type=1105 audit(1719906955.036:1237): pid=4162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.049675 kernel: audit: type=1103 audit(1719906955.038:1238): pid=4164 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.036000 audit[4162]: USER_START pid=4162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.038000 audit[4164]: CRED_ACQ pid=4164 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.212770 sshd[4162]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:55.217269 systemd[1]: Started sshd@12-137.184.188.4:22-147.75.109.163:38630.service. Jul 2 07:55:55.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.188.4:22-147.75.109.163:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.222526 kernel: audit: type=1130 audit(1719906955.216:1239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.188.4:22-147.75.109.163:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.222660 kernel: audit: type=1106 audit(1719906955.220:1240): pid=4162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.220000 audit[4162]: USER_END pid=4162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.222000 audit[4162]: CRED_DISP pid=4162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.188.4:22-147.75.109.163:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.229179 systemd[1]: sshd@11-137.184.188.4:22-147.75.109.163:38622.service: Deactivated successfully. Jul 2 07:55:55.230308 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:55:55.232564 systemd-logind[1180]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:55:55.234106 systemd-logind[1180]: Removed session 11. Jul 2 07:55:55.283000 audit[4174]: USER_ACCT pid=4174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.284898 sshd[4174]: Accepted publickey for core from 147.75.109.163 port 38630 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:55.285000 audit[4174]: CRED_ACQ pid=4174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.285000 audit[4174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf2a8980 a2=3 a3=0 items=0 ppid=1 pid=4174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:55.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:55.287576 sshd[4174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:55.294278 systemd-logind[1180]: New session 12 of user core. Jul 2 07:55:55.295170 systemd[1]: Started session-12.scope. Jul 2 07:55:55.301000 audit[4174]: USER_START pid=4174 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.304000 audit[4177]: CRED_ACQ pid=4177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.617562 sshd[4174]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:55.618000 audit[4174]: USER_END pid=4174 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.619000 audit[4174]: CRED_DISP pid=4174 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.627673 systemd[1]: Started sshd@13-137.184.188.4:22-147.75.109.163:38640.service. Jul 2 07:55:55.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.188.4:22-147.75.109.163:38640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.642143 systemd[1]: sshd@12-137.184.188.4:22-147.75.109.163:38630.service: Deactivated successfully. Jul 2 07:55:55.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.188.4:22-147.75.109.163:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.646739 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:55:55.651621 systemd-logind[1180]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:55:55.655392 systemd-logind[1180]: Removed session 12. Jul 2 07:55:55.701000 audit[4184]: USER_ACCT pid=4184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.703261 sshd[4184]: Accepted publickey for core from 147.75.109.163 port 38640 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:55.703000 audit[4184]: CRED_ACQ pid=4184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.703000 audit[4184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce5591b20 a2=3 a3=0 items=0 ppid=1 pid=4184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:55.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:55.706629 sshd[4184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:55.713691 systemd-logind[1180]: New session 13 of user core. Jul 2 07:55:55.715330 systemd[1]: Started session-13.scope. Jul 2 07:55:55.724000 audit[4184]: USER_START pid=4184 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.726000 audit[4187]: CRED_ACQ pid=4187 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.941360 sshd[4184]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:55.941000 audit[4184]: USER_END pid=4184 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.941000 audit[4184]: CRED_DISP pid=4184 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:55.946782 systemd[1]: sshd@13-137.184.188.4:22-147.75.109.163:38640.service: Deactivated successfully. Jul 2 07:55:55.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.188.4:22-147.75.109.163:38640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.948064 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:55:55.949093 systemd-logind[1180]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:55:55.950297 systemd-logind[1180]: Removed session 13. Jul 2 07:56:00.792210 kubelet[2021]: E0702 07:56:00.787715 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:00.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.188.4:22-147.75.109.163:38648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.952579 systemd[1]: Started sshd@14-137.184.188.4:22-147.75.109.163:38648.service. Jul 2 07:56:00.954192 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:56:00.954281 kernel: audit: type=1130 audit(1719906960.951:1260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.188.4:22-147.75.109.163:38648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:01.033597 sshd[4202]: Accepted publickey for core from 147.75.109.163 port 38648 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:01.032000 audit[4202]: USER_ACCT pid=4202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.041486 kernel: audit: type=1101 audit(1719906961.032:1261): pid=4202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.040000 audit[4202]: CRED_ACQ pid=4202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.043442 sshd[4202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:01.048476 kernel: audit: type=1103 audit(1719906961.040:1262): pid=4202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.054474 kernel: audit: type=1006 audit(1719906961.040:1263): pid=4202 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 07:56:01.040000 audit[4202]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9989c100 a2=3 a3=0 items=0 ppid=1 pid=4202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:01.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:01.063341 kernel: audit: type=1300 audit(1719906961.040:1263): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9989c100 a2=3 a3=0 items=0 ppid=1 pid=4202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:01.063570 kernel: audit: type=1327 audit(1719906961.040:1263): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:01.066217 systemd-logind[1180]: New session 14 of user core. Jul 2 07:56:01.067110 systemd[1]: Started session-14.scope. Jul 2 07:56:01.078000 audit[4202]: USER_START pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.088592 kernel: audit: type=1105 audit(1719906961.078:1264): pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.088819 kernel: audit: type=1103 audit(1719906961.082:1265): pid=4204 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.082000 audit[4204]: CRED_ACQ pid=4204 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.251195 sshd[4202]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:01.251000 audit[4202]: USER_END pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.260527 kernel: audit: type=1106 audit(1719906961.251:1266): pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.252000 audit[4202]: CRED_DISP pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.266441 kernel: audit: type=1104 audit(1719906961.252:1267): pid=4202 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:01.261868 systemd-logind[1180]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:56:01.263878 systemd[1]: sshd@14-137.184.188.4:22-147.75.109.163:38648.service: Deactivated successfully. Jul 2 07:56:01.265180 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:56:01.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.188.4:22-147.75.109.163:38648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:01.268018 systemd-logind[1180]: Removed session 14. Jul 2 07:56:06.258894 systemd[1]: Started sshd@15-137.184.188.4:22-147.75.109.163:34426.service. Jul 2 07:56:06.261014 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:56:06.261055 kernel: audit: type=1130 audit(1719906966.257:1269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.188.4:22-147.75.109.163:34426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.188.4:22-147.75.109.163:34426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.323000 audit[4224]: USER_ACCT pid=4224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.325668 sshd[4224]: Accepted publickey for core from 147.75.109.163 port 34426 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:06.329000 audit[4224]: CRED_ACQ pid=4224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.331791 sshd[4224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:06.335942 kernel: audit: type=1101 audit(1719906966.323:1270): pid=4224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.336154 kernel: audit: type=1103 audit(1719906966.329:1271): pid=4224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.329000 audit[4224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc398b28b0 a2=3 a3=0 items=0 ppid=1 pid=4224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:06.346905 kernel: audit: type=1006 audit(1719906966.329:1272): pid=4224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 07:56:06.347120 kernel: audit: type=1300 audit(1719906966.329:1272): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc398b28b0 a2=3 a3=0 items=0 ppid=1 pid=4224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:06.347165 kernel: audit: type=1327 audit(1719906966.329:1272): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:06.329000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:06.356077 systemd[1]: Started session-15.scope. Jul 2 07:56:06.357537 systemd-logind[1180]: New session 15 of user core. Jul 2 07:56:06.364000 audit[4224]: USER_START pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.367000 audit[4226]: CRED_ACQ pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.377470 kernel: audit: type=1105 audit(1719906966.364:1273): pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.377713 kernel: audit: type=1103 audit(1719906966.367:1274): pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.520352 sshd[4224]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:06.520000 audit[4224]: USER_END pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.520000 audit[4224]: CRED_DISP pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.532828 kernel: audit: type=1106 audit(1719906966.520:1275): pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.532992 kernel: audit: type=1104 audit(1719906966.520:1276): pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:06.535951 systemd-logind[1180]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:56:06.539087 systemd[1]: sshd@15-137.184.188.4:22-147.75.109.163:34426.service: Deactivated successfully. Jul 2 07:56:06.540063 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:56:06.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.188.4:22-147.75.109.163:34426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.542679 systemd-logind[1180]: Removed session 15. Jul 2 07:56:08.784710 kubelet[2021]: E0702 07:56:08.784665 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:11.531159 systemd[1]: Started sshd@16-137.184.188.4:22-147.75.109.163:34436.service. Jul 2 07:56:11.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.188.4:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.534122 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:56:11.534247 kernel: audit: type=1130 audit(1719906971.531:1278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.188.4:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.589000 audit[4236]: USER_ACCT pid=4236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.596469 kernel: audit: type=1101 audit(1719906971.589:1279): pid=4236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.596920 sshd[4236]: Accepted publickey for core from 147.75.109.163 port 34436 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:11.600048 sshd[4236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:11.597000 audit[4236]: CRED_ACQ pid=4236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.605494 kernel: audit: type=1103 audit(1719906971.597:1280): pid=4236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.598000 audit[4236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcff04f60 a2=3 a3=0 items=0 ppid=1 pid=4236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.615327 kernel: audit: type=1006 audit(1719906971.598:1281): pid=4236 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:56:11.615665 kernel: audit: type=1300 audit(1719906971.598:1281): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcff04f60 a2=3 a3=0 items=0 ppid=1 pid=4236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:11.618601 kernel: audit: type=1327 audit(1719906971.598:1281): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:11.624191 systemd-logind[1180]: New session 16 of user core. Jul 2 07:56:11.626646 systemd[1]: Started session-16.scope. Jul 2 07:56:11.633000 audit[4236]: USER_START pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.643820 kernel: audit: type=1105 audit(1719906971.633:1282): pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.643000 audit[4238]: CRED_ACQ pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.653477 kernel: audit: type=1103 audit(1719906971.643:1283): pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.868647 sshd[4236]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:11.869000 audit[4236]: USER_END pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.881046 kernel: audit: type=1106 audit(1719906971.869:1284): pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.869000 audit[4236]: CRED_DISP pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.891204 kernel: audit: type=1104 audit(1719906971.869:1285): pid=4236 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:11.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.188.4:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.889827 systemd[1]: sshd@16-137.184.188.4:22-147.75.109.163:34436.service: Deactivated successfully. Jul 2 07:56:11.892408 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:56:11.894100 systemd-logind[1180]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:56:11.896690 systemd-logind[1180]: Removed session 16. Jul 2 07:56:16.785399 kubelet[2021]: E0702 07:56:16.785342 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:16.879673 systemd[1]: Started sshd@17-137.184.188.4:22-147.75.109.163:54990.service. Jul 2 07:56:16.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.188.4:22-147.75.109.163:54990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.882787 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:56:16.882910 kernel: audit: type=1130 audit(1719906976.879:1287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.188.4:22-147.75.109.163:54990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.934000 audit[4262]: USER_ACCT pid=4262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.936888 sshd[4262]: Accepted publickey for core from 147.75.109.163 port 54990 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:16.942476 kernel: audit: type=1101 audit(1719906976.934:1288): pid=4262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.942000 audit[4262]: CRED_ACQ pid=4262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.944316 sshd[4262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:16.949460 kernel: audit: type=1103 audit(1719906976.942:1289): pid=4262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.953485 kernel: audit: type=1006 audit(1719906976.942:1290): pid=4262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 07:56:16.942000 audit[4262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe84d500c0 a2=3 a3=0 items=0 ppid=1 pid=4262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:16.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:16.960967 kernel: audit: type=1300 audit(1719906976.942:1290): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe84d500c0 a2=3 a3=0 items=0 ppid=1 pid=4262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:16.961122 kernel: audit: type=1327 audit(1719906976.942:1290): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:16.964549 systemd-logind[1180]: New session 17 of user core. Jul 2 07:56:16.964920 systemd[1]: Started session-17.scope. Jul 2 07:56:16.970000 audit[4262]: USER_START pid=4262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.978513 kernel: audit: type=1105 audit(1719906976.970:1291): pid=4262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.977000 audit[4264]: CRED_ACQ pid=4264 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:16.983508 kernel: audit: type=1103 audit(1719906976.977:1292): pid=4264 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.155886 sshd[4262]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:17.163649 systemd[1]: Started sshd@18-137.184.188.4:22-147.75.109.163:54992.service. Jul 2 07:56:17.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.188.4:22-147.75.109.163:54992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:17.169679 systemd-logind[1180]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:56:17.166000 audit[4262]: USER_END pid=4262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.172567 systemd[1]: sshd@17-137.184.188.4:22-147.75.109.163:54990.service: Deactivated successfully. Jul 2 07:56:17.174211 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:56:17.175606 systemd-logind[1180]: Removed session 17. Jul 2 07:56:17.177342 kernel: audit: type=1130 audit(1719906977.163:1293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.188.4:22-147.75.109.163:54992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:17.177669 kernel: audit: type=1106 audit(1719906977.166:1294): pid=4262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.166000 audit[4262]: CRED_DISP pid=4262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.188.4:22-147.75.109.163:54990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:17.239000 audit[4273]: USER_ACCT pid=4273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.241041 sshd[4273]: Accepted publickey for core from 147.75.109.163 port 54992 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:17.241000 audit[4273]: CRED_ACQ pid=4273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.242000 audit[4273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea3e5990 a2=3 a3=0 items=0 ppid=1 pid=4273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:17.244873 sshd[4273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:17.254115 systemd[1]: Started session-18.scope. Jul 2 07:56:17.255182 systemd-logind[1180]: New session 18 of user core. Jul 2 07:56:17.260000 audit[4273]: USER_START pid=4273 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.263000 audit[4276]: CRED_ACQ pid=4276 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.634027 sshd[4273]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:17.635000 audit[4273]: USER_END pid=4273 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.635000 audit[4273]: CRED_DISP pid=4273 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.188.4:22-147.75.109.163:55008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:17.638124 systemd[1]: Started sshd@19-137.184.188.4:22-147.75.109.163:55008.service. Jul 2 07:56:17.639899 systemd[1]: sshd@18-137.184.188.4:22-147.75.109.163:54992.service: Deactivated successfully. Jul 2 07:56:17.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.188.4:22-147.75.109.163:54992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:17.641354 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:56:17.643941 systemd-logind[1180]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:56:17.645970 systemd-logind[1180]: Removed session 18. Jul 2 07:56:17.690000 audit[4283]: USER_ACCT pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.691859 sshd[4283]: Accepted publickey for core from 147.75.109.163 port 55008 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:17.692000 audit[4283]: CRED_ACQ pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.692000 audit[4283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca06bc560 a2=3 a3=0 items=0 ppid=1 pid=4283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:17.695697 sshd[4283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:17.702864 systemd[1]: Started session-19.scope. Jul 2 07:56:17.703475 systemd-logind[1180]: New session 19 of user core. Jul 2 07:56:17.711000 audit[4283]: USER_START pid=4283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:17.714000 audit[4286]: CRED_ACQ pid=4286 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:18.558201 systemd[1]: run-containerd-runc-k8s.io-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1-runc.TMPefl.mount: Deactivated successfully. Jul 2 07:56:20.268714 sshd[4283]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:20.276000 audit[4283]: USER_END pid=4283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.276000 audit[4283]: CRED_DISP pid=4283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.278256 systemd[1]: Started sshd@20-137.184.188.4:22-147.75.109.163:55010.service. Jul 2 07:56:20.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.188.4:22-147.75.109.163:55010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.283457 systemd[1]: sshd@19-137.184.188.4:22-147.75.109.163:55008.service: Deactivated successfully. Jul 2 07:56:20.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.188.4:22-147.75.109.163:55008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.291706 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:56:20.292663 systemd-logind[1180]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:56:20.296903 systemd-logind[1180]: Removed session 19. Jul 2 07:56:20.305000 audit[4319]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:20.305000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff93649670 a2=0 a3=7fff9364965c items=0 ppid=2212 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:20.313000 audit[4319]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:20.313000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff93649670 a2=0 a3=0 items=0 ppid=2212 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:20.348000 audit[4318]: USER_ACCT pid=4318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.350121 sshd[4318]: Accepted publickey for core from 147.75.109.163 port 55010 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:20.349000 audit[4318]: CRED_ACQ pid=4318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.349000 audit[4318]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe12b65d30 a2=3 a3=0 items=0 ppid=1 pid=4318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:20.351955 sshd[4318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:20.353000 audit[4323]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:20.353000 audit[4323]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc5d1823b0 a2=0 a3=7ffc5d18239c items=0 ppid=2212 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:20.358793 systemd[1]: Started session-20.scope. Jul 2 07:56:20.359138 systemd-logind[1180]: New session 20 of user core. Jul 2 07:56:20.362000 audit[4323]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:20.362000 audit[4323]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5d1823b0 a2=0 a3=0 items=0 ppid=2212 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:20.369000 audit[4318]: USER_START pid=4318 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.372000 audit[4324]: CRED_ACQ pid=4324 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:20.404333 systemd[1]: run-containerd-runc-k8s.io-10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2-runc.lD07U0.mount: Deactivated successfully. Jul 2 07:56:21.089907 sshd[4318]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:21.094000 audit[4318]: USER_END pid=4318 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.094000 audit[4318]: CRED_DISP pid=4318 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.098275 systemd[1]: Started sshd@21-137.184.188.4:22-147.75.109.163:55012.service. Jul 2 07:56:21.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.188.4:22-147.75.109.163:55012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.188.4:22-147.75.109.163:55010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.099006 systemd[1]: sshd@20-137.184.188.4:22-147.75.109.163:55010.service: Deactivated successfully. Jul 2 07:56:21.101450 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:56:21.105163 systemd-logind[1180]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:56:21.106527 systemd-logind[1180]: Removed session 20. Jul 2 07:56:21.152000 audit[4350]: USER_ACCT pid=4350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.154032 sshd[4350]: Accepted publickey for core from 147.75.109.163 port 55012 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:21.155000 audit[4350]: CRED_ACQ pid=4350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.155000 audit[4350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd48682a0 a2=3 a3=0 items=0 ppid=1 pid=4350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:21.157367 sshd[4350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:21.165478 systemd-logind[1180]: New session 21 of user core. Jul 2 07:56:21.165694 systemd[1]: Started session-21.scope. Jul 2 07:56:21.172000 audit[4350]: USER_START pid=4350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.174000 audit[4353]: CRED_ACQ pid=4353 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.330389 sshd[4350]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:21.331000 audit[4350]: USER_END pid=4350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.331000 audit[4350]: CRED_DISP pid=4350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:21.335817 systemd-logind[1180]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:56:21.336221 systemd[1]: sshd@21-137.184.188.4:22-147.75.109.163:55012.service: Deactivated successfully. Jul 2 07:56:21.337106 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:56:21.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.188.4:22-147.75.109.163:55012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.339256 systemd-logind[1180]: Removed session 21. Jul 2 07:56:23.069520 kubelet[2021]: I0702 07:56:23.068634 2021 topology_manager.go:215] "Topology Admit Handler" podUID="070093c3-2b32-41c0-8c53-17872117b613" podNamespace="calico-apiserver" podName="calico-apiserver-548456c95d-7bskc" Jul 2 07:56:23.111003 systemd[1]: Created slice kubepods-besteffort-pod070093c3_2b32_41c0_8c53_17872117b613.slice. Jul 2 07:56:23.148586 kernel: kauditd_printk_skb: 57 callbacks suppressed Jul 2 07:56:23.148801 kernel: audit: type=1325 audit(1719906983.142:1336): table=filter:117 family=2 entries=32 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.148844 kernel: audit: type=1300 audit(1719906983.142:1336): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdaef5eb70 a2=0 a3=7ffdaef5eb5c items=0 ppid=2212 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.142000 audit[4364]: NETFILTER_CFG table=filter:117 family=2 entries=32 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.142000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdaef5eb70 a2=0 a3=7ffdaef5eb5c items=0 ppid=2212 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.159493 kernel: audit: type=1327 audit(1719906983.142:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.161170 kubelet[2021]: I0702 07:56:23.161105 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/070093c3-2b32-41c0-8c53-17872117b613-calico-apiserver-certs\") pod \"calico-apiserver-548456c95d-7bskc\" (UID: \"070093c3-2b32-41c0-8c53-17872117b613\") " pod="calico-apiserver/calico-apiserver-548456c95d-7bskc" Jul 2 07:56:23.161324 kubelet[2021]: I0702 07:56:23.161205 2021 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ml7vz\" (UniqueName: \"kubernetes.io/projected/070093c3-2b32-41c0-8c53-17872117b613-kube-api-access-ml7vz\") pod \"calico-apiserver-548456c95d-7bskc\" (UID: \"070093c3-2b32-41c0-8c53-17872117b613\") " pod="calico-apiserver/calico-apiserver-548456c95d-7bskc" Jul 2 07:56:23.142000 audit[4364]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.142000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdaef5eb70 a2=0 a3=0 items=0 ppid=2212 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.174168 kernel: audit: type=1325 audit(1719906983.142:1337): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.174305 kernel: audit: type=1300 audit(1719906983.142:1337): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdaef5eb70 a2=0 a3=0 items=0 ppid=2212 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.180491 kernel: audit: type=1327 audit(1719906983.142:1337): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.199000 audit[4366]: NETFILTER_CFG table=filter:119 family=2 entries=33 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.199000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffec41642c0 a2=0 a3=7ffec41642ac items=0 ppid=2212 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.210010 kernel: audit: type=1325 audit(1719906983.199:1338): table=filter:119 family=2 entries=33 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.210206 kernel: audit: type=1300 audit(1719906983.199:1338): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffec41642c0 a2=0 a3=7ffec41642ac items=0 ppid=2212 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.210261 kernel: audit: type=1327 audit(1719906983.199:1338): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.201000 audit[4366]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.201000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffec41642c0 a2=0 a3=0 items=0 ppid=2212 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.219560 kernel: audit: type=1325 audit(1719906983.201:1339): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.274124 kubelet[2021]: E0702 07:56:23.272313 2021 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:56:23.284934 kubelet[2021]: E0702 07:56:23.284880 2021 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/070093c3-2b32-41c0-8c53-17872117b613-calico-apiserver-certs podName:070093c3-2b32-41c0-8c53-17872117b613 nodeName:}" failed. No retries permitted until 2024-07-02 07:56:23.77419981 +0000 UTC m=+99.291495602 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/070093c3-2b32-41c0-8c53-17872117b613-calico-apiserver-certs") pod "calico-apiserver-548456c95d-7bskc" (UID: "070093c3-2b32-41c0-8c53-17872117b613") : secret "calico-apiserver-certs" not found Jul 2 07:56:24.021374 env[1190]: time="2024-07-02T07:56:24.021278453Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-548456c95d-7bskc,Uid:070093c3-2b32-41c0-8c53-17872117b613,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:56:24.351926 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali619c44fe6a4: link becomes ready Jul 2 07:56:24.354315 systemd-networkd[999]: cali619c44fe6a4: Link UP Jul 2 07:56:24.355860 systemd-networkd[999]: cali619c44fe6a4: Gained carrier Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.171 [INFO][4369] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0 calico-apiserver-548456c95d- calico-apiserver 070093c3-2b32-41c0-8c53-17872117b613 1136 0 2024-07-02 07:56:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:548456c95d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-4df693d906 calico-apiserver-548456c95d-7bskc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali619c44fe6a4 [] []}} ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.171 [INFO][4369] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.232 [INFO][4380] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" HandleID="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.249 [INFO][4380] ipam_plugin.go 264: Auto assigning IP ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" HandleID="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7cc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-4df693d906", "pod":"calico-apiserver-548456c95d-7bskc", "timestamp":"2024-07-02 07:56:24.232718886 +0000 UTC"}, Hostname:"ci-3510.3.5-a-4df693d906", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.249 [INFO][4380] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.249 [INFO][4380] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.249 [INFO][4380] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-4df693d906' Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.264 [INFO][4380] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.279 [INFO][4380] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.288 [INFO][4380] ipam.go 489: Trying affinity for 192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.299 [INFO][4380] ipam.go 155: Attempting to load block cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.305 [INFO][4380] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.0/26 host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.305 [INFO][4380] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.0/26 handle="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.309 [INFO][4380] ipam.go 1685: Creating new handle: k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.318 [INFO][4380] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.0/26 handle="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.340 [INFO][4380] ipam.go 1216: Successfully claimed IPs: [192.168.38.5/26] block=192.168.38.0/26 handle="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.341 [INFO][4380] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.5/26] handle="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" host="ci-3510.3.5-a-4df693d906" Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.341 [INFO][4380] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:24.378922 env[1190]: 2024-07-02 07:56:24.341 [INFO][4380] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.38.5/26] IPv6=[] ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" HandleID="k8s-pod-network.7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Workload="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.345 [INFO][4369] k8s.go 386: Populated endpoint ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0", GenerateName:"calico-apiserver-548456c95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"070093c3-2b32-41c0-8c53-17872117b613", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"548456c95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"", Pod:"calico-apiserver-548456c95d-7bskc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali619c44fe6a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.345 [INFO][4369] k8s.go 387: Calico CNI using IPs: [192.168.38.5/32] ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.345 [INFO][4369] dataplane_linux.go 68: Setting the host side veth name to cali619c44fe6a4 ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.349 [INFO][4369] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.360 [INFO][4369] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0", GenerateName:"calico-apiserver-548456c95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"070093c3-2b32-41c0-8c53-17872117b613", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"548456c95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-4df693d906", ContainerID:"7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b", Pod:"calico-apiserver-548456c95d-7bskc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali619c44fe6a4", MAC:"5a:8c:a1:1e:c8:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:24.380045 env[1190]: 2024-07-02 07:56:24.374 [INFO][4369] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b" Namespace="calico-apiserver" Pod="calico-apiserver-548456c95d-7bskc" WorkloadEndpoint="ci--3510.3.5--a--4df693d906-k8s-calico--apiserver--548456c95d--7bskc-eth0" Jul 2 07:56:24.416552 env[1190]: time="2024-07-02T07:56:24.416377152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:24.416824 env[1190]: time="2024-07-02T07:56:24.416794035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:24.417027 env[1190]: time="2024-07-02T07:56:24.417000152Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:24.417525 env[1190]: time="2024-07-02T07:56:24.417385500Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b pid=4407 runtime=io.containerd.runc.v2 Jul 2 07:56:24.451858 systemd[1]: run-containerd-runc-k8s.io-7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b-runc.ZlSda4.mount: Deactivated successfully. Jul 2 07:56:24.462647 systemd[1]: Started cri-containerd-7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b.scope. Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.546000 audit: BPF prog-id=180 op=LOAD Jul 2 07:56:24.548000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.548000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4407 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761666237343662363531633335306334366664346265386263633832 Jul 2 07:56:24.548000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.548000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4407 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761666237343662363531633335306334366664346265386263633832 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.549000 audit: BPF prog-id=181 op=LOAD Jul 2 07:56:24.549000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e4590 items=0 ppid=4407 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761666237343662363531633335306334366664346265386263633832 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.550000 audit: BPF prog-id=182 op=LOAD Jul 2 07:56:24.550000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e45d8 items=0 ppid=4407 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761666237343662363531633335306334366664346265386263633832 Jul 2 07:56:24.551000 audit: BPF prog-id=182 op=UNLOAD Jul 2 07:56:24.551000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.551000 audit: BPF prog-id=183 op=LOAD Jul 2 07:56:24.551000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e49e8 items=0 ppid=4407 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761666237343662363531633335306334366664346265386263633832 Jul 2 07:56:24.566000 audit[4434]: NETFILTER_CFG table=filter:121 family=2 entries=61 op=nft_register_chain pid=4434 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:24.566000 audit[4434]: SYSCALL arch=c000003e syscall=46 success=yes exit=30316 a0=3 a1=7ffccd3502e0 a2=0 a3=7ffccd3502cc items=0 ppid=3017 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:24.636775 env[1190]: time="2024-07-02T07:56:24.636618515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-548456c95d-7bskc,Uid:070093c3-2b32-41c0-8c53-17872117b613,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b\"" Jul 2 07:56:24.656642 env[1190]: time="2024-07-02T07:56:24.656567359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:56:26.341000 systemd[1]: Started sshd@22-137.184.188.4:22-147.75.109.163:42554.service. Jul 2 07:56:26.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.188.4:22-147.75.109.163:42554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:26.381943 systemd-networkd[999]: cali619c44fe6a4: Gained IPv6LL Jul 2 07:56:26.411000 audit[4448]: USER_ACCT pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.413277 sshd[4448]: Accepted publickey for core from 147.75.109.163 port 42554 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:26.413000 audit[4448]: CRED_ACQ pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.413000 audit[4448]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e278e90 a2=3 a3=0 items=0 ppid=1 pid=4448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:26.413000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:26.416699 sshd[4448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:26.424640 systemd-logind[1180]: New session 22 of user core. Jul 2 07:56:26.425116 systemd[1]: Started session-22.scope. Jul 2 07:56:26.431000 audit[4448]: USER_START pid=4448 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.433000 audit[4450]: CRED_ACQ pid=4450 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.704955 sshd[4448]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:26.706000 audit[4448]: USER_END pid=4448 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.706000 audit[4448]: CRED_DISP pid=4448 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:26.709486 systemd[1]: sshd@22-137.184.188.4:22-147.75.109.163:42554.service: Deactivated successfully. Jul 2 07:56:26.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.188.4:22-147.75.109.163:42554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:26.710642 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:56:26.711411 systemd-logind[1180]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:56:26.713759 systemd-logind[1180]: Removed session 22. Jul 2 07:56:27.489000 audit[4460]: NETFILTER_CFG table=filter:122 family=2 entries=22 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.489000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc23ff6790 a2=0 a3=7ffc23ff677c items=0 ppid=2212 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:27.491000 audit[4460]: NETFILTER_CFG table=nat:123 family=2 entries=104 op=nft_register_chain pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.491000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc23ff6790 a2=0 a3=7ffc23ff677c items=0 ppid=2212 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:28.449460 env[1190]: time="2024-07-02T07:56:28.448996532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:28.451475 env[1190]: time="2024-07-02T07:56:28.450785574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:28.452469 env[1190]: time="2024-07-02T07:56:28.452387809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:28.454781 env[1190]: time="2024-07-02T07:56:28.454745238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:28.455551 env[1190]: time="2024-07-02T07:56:28.455495490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:56:28.499276 env[1190]: time="2024-07-02T07:56:28.499065543Z" level=info msg="CreateContainer within sandbox \"7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:56:28.514942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2072644606.mount: Deactivated successfully. Jul 2 07:56:28.520220 env[1190]: time="2024-07-02T07:56:28.520145961Z" level=info msg="CreateContainer within sandbox \"7afb746b651c350c46fd4be8bcc8234bdac5d3137ea4775b65969aeb1af7a69b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fcdb15bff9bbe719134668fbc94b71ea4222855fdb06029237d82633b4ff2dad\"" Jul 2 07:56:28.523449 env[1190]: time="2024-07-02T07:56:28.522474704Z" level=info msg="StartContainer for \"fcdb15bff9bbe719134668fbc94b71ea4222855fdb06029237d82633b4ff2dad\"" Jul 2 07:56:28.589780 systemd[1]: Started cri-containerd-fcdb15bff9bbe719134668fbc94b71ea4222855fdb06029237d82633b4ff2dad.scope. Jul 2 07:56:28.614384 kernel: kauditd_printk_skb: 79 callbacks suppressed Jul 2 07:56:28.614610 kernel: audit: type=1400 audit(1719906988.611:1370): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620843 kernel: audit: type=1400 audit(1719906988.611:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.629460 kernel: audit: type=1400 audit(1719906988.611:1372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.629598 kernel: audit: type=1400 audit(1719906988.611:1373): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.629625 kernel: audit: type=1400 audit(1719906988.611:1374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.637252 kernel: audit: type=1400 audit(1719906988.611:1375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.637434 kernel: audit: type=1400 audit(1719906988.611:1376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.649060 kernel: audit: type=1400 audit(1719906988.611:1377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.649216 kernel: audit: type=1400 audit(1719906988.611:1378): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.653674 kernel: audit: type=1400 audit(1719906988.616:1379): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.616000 audit: BPF prog-id=184 op=LOAD Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4407 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646231356266663962626537313931333436363866626339346237 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4407 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646231356266663962626537313931333436363866626339346237 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit: BPF prog-id=185 op=LOAD Jul 2 07:56:28.620000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001ccdf0 items=0 ppid=4407 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646231356266663962626537313931333436363866626339346237 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit: BPF prog-id=186 op=LOAD Jul 2 07:56:28.620000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001cce38 items=0 ppid=4407 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646231356266663962626537313931333436363866626339346237 Jul 2 07:56:28.620000 audit: BPF prog-id=186 op=UNLOAD Jul 2 07:56:28.620000 audit: BPF prog-id=185 op=UNLOAD Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.620000 audit: BPF prog-id=187 op=LOAD Jul 2 07:56:28.620000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cd248 items=0 ppid=4407 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646231356266663962626537313931333436363866626339346237 Jul 2 07:56:28.693744 env[1190]: time="2024-07-02T07:56:28.693661740Z" level=info msg="StartContainer for \"fcdb15bff9bbe719134668fbc94b71ea4222855fdb06029237d82633b4ff2dad\" returns successfully" Jul 2 07:56:29.251000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_23.1347410217/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c926 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c51,c926 tclass=file permissive=0 Jul 2 07:56:29.251000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006d6d40 a2=fc6 a3=0 items=0 ppid=4407 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c926 key=(null) Jul 2 07:56:29.251000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:56:29.405000 audit[4501]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.405000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc3ca2b850 a2=0 a3=7ffc3ca2b83c items=0 ppid=2212 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:29.410000 audit[4501]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.410000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc3ca2b850 a2=0 a3=7ffc3ca2b83c items=0 ppid=2212 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:29.456628 kubelet[2021]: I0702 07:56:29.433651 2021 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-548456c95d-7bskc" podStartSLOduration=2.609013476 podStartE2EDuration="6.417174116s" podCreationTimestamp="2024-07-02 07:56:23 +0000 UTC" firstStartedPulling="2024-07-02 07:56:24.655671065 +0000 UTC m=+100.172966841" lastFinishedPulling="2024-07-02 07:56:28.463831703 +0000 UTC m=+103.981127481" observedRunningTime="2024-07-02 07:56:29.414729793 +0000 UTC m=+104.932025590" watchObservedRunningTime="2024-07-02 07:56:29.417174116 +0000 UTC m=+104.934469910" Jul 2 07:56:29.507844 systemd[1]: run-containerd-runc-k8s.io-fcdb15bff9bbe719134668fbc94b71ea4222855fdb06029237d82633b4ff2dad-runc.sQGFx8.mount: Deactivated successfully. Jul 2 07:56:29.516000 audit[4503]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.516000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc426f6c70 a2=0 a3=7ffc426f6c5c items=0 ppid=2212 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:29.521000 audit[4503]: NETFILTER_CFG table=nat:127 family=2 entries=51 op=nft_register_chain pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.521000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffc426f6c70 a2=0 a3=7ffc426f6c5c items=0 ppid=2212 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.461000 audit[4507]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.461000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff98caa4f0 a2=0 a3=7fff98caa4dc items=0 ppid=2212 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.464000 audit[4507]: NETFILTER_CFG table=nat:129 family=2 entries=54 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.464000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7fff98caa4f0 a2=0 a3=7fff98caa4dc items=0 ppid=2212 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:31.716157 systemd[1]: Started sshd@23-137.184.188.4:22-147.75.109.163:42558.service. Jul 2 07:56:31.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.188.4:22-147.75.109.163:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:31.785393 sshd[4509]: Accepted publickey for core from 147.75.109.163 port 42558 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:31.783000 audit[4509]: USER_ACCT pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:31.791000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:31.792000 audit[4509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffced062960 a2=3 a3=0 items=0 ppid=1 pid=4509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:31.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:31.795717 kubelet[2021]: E0702 07:56:31.795310 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:31.796368 sshd[4509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:31.807566 systemd-logind[1180]: New session 23 of user core. Jul 2 07:56:31.808320 systemd[1]: Started session-23.scope. Jul 2 07:56:31.813000 audit[4509]: USER_START pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:31.816000 audit[4511]: CRED_ACQ pid=4511 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:32.212243 sshd[4509]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:32.212000 audit[4509]: USER_END pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:32.212000 audit[4509]: CRED_DISP pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:32.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.188.4:22-147.75.109.163:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:32.215872 systemd[1]: sshd@23-137.184.188.4:22-147.75.109.163:42558.service: Deactivated successfully. Jul 2 07:56:32.216995 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:56:32.218717 systemd-logind[1180]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:56:32.219823 systemd-logind[1180]: Removed session 23. Jul 2 07:56:37.221284 systemd[1]: Started sshd@24-137.184.188.4:22-147.75.109.163:60570.service. Jul 2 07:56:37.224190 kernel: kauditd_printk_skb: 79 callbacks suppressed Jul 2 07:56:37.224336 kernel: audit: type=1130 audit(1719906997.220:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.188.4:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:37.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.188.4:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:37.279000 audit[4530]: USER_ACCT pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.281451 sshd[4530]: Accepted publickey for core from 147.75.109.163 port 60570 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:37.286469 kernel: audit: type=1101 audit(1719906997.279:1405): pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.287000 audit[4530]: CRED_ACQ pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.289778 sshd[4530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:37.302831 kernel: audit: type=1103 audit(1719906997.287:1406): pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.302978 kernel: audit: type=1006 audit(1719906997.287:1407): pid=4530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:56:37.287000 audit[4530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8b55da40 a2=3 a3=0 items=0 ppid=1 pid=4530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.287000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:37.313083 kernel: audit: type=1300 audit(1719906997.287:1407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8b55da40 a2=3 a3=0 items=0 ppid=1 pid=4530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.313220 kernel: audit: type=1327 audit(1719906997.287:1407): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:37.315109 systemd-logind[1180]: New session 24 of user core. Jul 2 07:56:37.316220 systemd[1]: Started session-24.scope. Jul 2 07:56:37.320000 audit[4530]: USER_START pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.328514 kernel: audit: type=1105 audit(1719906997.320:1408): pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.327000 audit[4532]: CRED_ACQ pid=4532 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.334559 kernel: audit: type=1103 audit(1719906997.327:1409): pid=4532 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.521508 sshd[4530]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:37.522000 audit[4530]: USER_END pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.530018 systemd[1]: sshd@24-137.184.188.4:22-147.75.109.163:60570.service: Deactivated successfully. Jul 2 07:56:37.530572 kernel: audit: type=1106 audit(1719906997.522:1410): pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.530943 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:56:37.531631 systemd-logind[1180]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:56:37.532918 systemd-logind[1180]: Removed session 24. Jul 2 07:56:37.523000 audit[4530]: CRED_DISP pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.538522 kernel: audit: type=1104 audit(1719906997.523:1411): pid=4530 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:37.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.188.4:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:39.301000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:39.301000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:39.301000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015627c0 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:39.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:39.301000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ad3710 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:39.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:40.485000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.485000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.485000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0073a7dd0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.485000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c01045e3e0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.486000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.486000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0072096e0 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.486000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.491000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.491000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0079fe420 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.491000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.493000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.493000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00769a540 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.493000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.494000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:40.494000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0079fe570 a2=fc6 a3=0 items=0 ppid=1732 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c523 key=(null) Jul 2 07:56:40.494000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3138382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:56:40.791700 kubelet[2021]: E0702 07:56:40.791559 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:41.785122 kubelet[2021]: E0702 07:56:41.785054 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:42.528736 systemd[1]: Started sshd@25-137.184.188.4:22-147.75.109.163:40446.service. Jul 2 07:56:42.531633 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 07:56:42.531698 kernel: audit: type=1130 audit(1719907002.527:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.188.4:22-147.75.109.163:40446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.188.4:22-147.75.109.163:40446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.593000 audit[4565]: USER_ACCT pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.600364 sshd[4565]: Accepted publickey for core from 147.75.109.163 port 40446 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:42.600845 kernel: audit: type=1101 audit(1719907002.593:1422): pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.601000 audit[4565]: CRED_ACQ pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.608119 sshd[4565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:42.608633 kernel: audit: type=1103 audit(1719907002.601:1423): pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.612473 kernel: audit: type=1006 audit(1719907002.601:1424): pid=4565 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 07:56:42.601000 audit[4565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56c724f0 a2=3 a3=0 items=0 ppid=1 pid=4565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.618567 kernel: audit: type=1300 audit(1719907002.601:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56c724f0 a2=3 a3=0 items=0 ppid=1 pid=4565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.630346 kernel: audit: type=1327 audit(1719907002.601:1424): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:42.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:42.627270 systemd[1]: Started session-25.scope. Jul 2 07:56:42.629820 systemd-logind[1180]: New session 25 of user core. Jul 2 07:56:42.650572 kernel: audit: type=1105 audit(1719907002.642:1425): pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.642000 audit[4565]: USER_START pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.649000 audit[4568]: CRED_ACQ pid=4568 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.655819 kernel: audit: type=1103 audit(1719907002.649:1426): pid=4568 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.814286 sshd[4565]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:42.814000 audit[4565]: USER_END pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.814000 audit[4565]: CRED_DISP pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.821951 systemd[1]: sshd@25-137.184.188.4:22-147.75.109.163:40446.service: Deactivated successfully. Jul 2 07:56:42.822946 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:56:42.826794 kernel: audit: type=1106 audit(1719907002.814:1427): pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.826933 kernel: audit: type=1104 audit(1719907002.814:1428): pid=4565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.827115 systemd-logind[1180]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:56:42.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.188.4:22-147.75.109.163:40446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.829353 systemd-logind[1180]: Removed session 25. Jul 2 07:56:44.785993 kubelet[2021]: E0702 07:56:44.785916 2021 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Jul 2 07:56:44.887000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:44.887000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015b4a60 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:44.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:44.887000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:44.887000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107e100 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:44.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:44.889000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:44.889000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015b4c00 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:44.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:44.889000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:44.889000 audit[1896]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015b4c20 a2=fc6 a3=0 items=0 ppid=1722 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c663 key=(null) Jul 2 07:56:44.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:47.828520 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:56:47.828696 kernel: audit: type=1130 audit(1719907007.823:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.188.4:22-147.75.109.163:40452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:47.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.188.4:22-147.75.109.163:40452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:47.824684 systemd[1]: Started sshd@26-137.184.188.4:22-147.75.109.163:40452.service. Jul 2 07:56:47.868000 audit[4586]: USER_ACCT pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.870262 sshd[4586]: Accepted publickey for core from 147.75.109.163 port 40452 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:47.873000 audit[4586]: CRED_ACQ pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.881001 kernel: audit: type=1101 audit(1719907007.868:1435): pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.881181 kernel: audit: type=1103 audit(1719907007.873:1436): pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.881561 sshd[4586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:47.889719 kernel: audit: type=1006 audit(1719907007.873:1437): pid=4586 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 07:56:47.873000 audit[4586]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed86b0790 a2=3 a3=0 items=0 ppid=1 pid=4586 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:47.896514 kernel: audit: type=1300 audit(1719907007.873:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed86b0790 a2=3 a3=0 items=0 ppid=1 pid=4586 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:47.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:47.899704 kernel: audit: type=1327 audit(1719907007.873:1437): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:47.900089 systemd-logind[1180]: New session 26 of user core. Jul 2 07:56:47.901562 systemd[1]: Started session-26.scope. Jul 2 07:56:47.908000 audit[4586]: USER_START pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.915976 kernel: audit: type=1105 audit(1719907007.908:1438): pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.915000 audit[4588]: CRED_ACQ pid=4588 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:47.926487 kernel: audit: type=1103 audit(1719907007.915:1439): pid=4588 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:48.053653 sshd[4586]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:48.053000 audit[4586]: USER_END pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:48.061455 kernel: audit: type=1106 audit(1719907008.053:1440): pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:48.062809 systemd-logind[1180]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:56:48.064379 systemd[1]: sshd@26-137.184.188.4:22-147.75.109.163:40452.service: Deactivated successfully. Jul 2 07:56:48.065247 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:56:48.066694 systemd-logind[1180]: Removed session 26. Jul 2 07:56:48.059000 audit[4586]: CRED_DISP pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:48.071452 kernel: audit: type=1104 audit(1719907008.059:1441): pid=4586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:48.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.188.4:22-147.75.109.163:40452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:48.535741 systemd[1]: run-containerd-runc-k8s.io-105e9ba06475fe53c3905bebb47782e08ad50f525274d7e963f451f0bf08fbf1-runc.oHQTqb.mount: Deactivated successfully. Jul 2 07:56:50.405764 systemd[1]: run-containerd-runc-k8s.io-10c5ca35dd244020d7888316c7afc0fd0fa22a80a7135a874e4b0d2760bb8dd2-runc.1kTo4g.mount: Deactivated successfully. Jul 2 07:56:53.061317 systemd[1]: Started sshd@27-137.184.188.4:22-147.75.109.163:41060.service. Jul 2 07:56:53.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.188.4:22-147.75.109.163:41060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:53.063613 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:56:53.063743 kernel: audit: type=1130 audit(1719907013.060:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.188.4:22-147.75.109.163:41060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:53.123000 audit[4644]: USER_ACCT pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.130643 sshd[4644]: Accepted publickey for core from 147.75.109.163 port 41060 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:56:53.137812 kernel: audit: type=1101 audit(1719907013.123:1444): pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.138025 kernel: audit: type=1103 audit(1719907013.132:1445): pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.132000 audit[4644]: CRED_ACQ pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.137000 audit[4644]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad821890 a2=3 a3=0 items=0 ppid=1 pid=4644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:53.146325 kernel: audit: type=1006 audit(1719907013.137:1446): pid=4644 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 07:56:53.146668 kernel: audit: type=1300 audit(1719907013.137:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad821890 a2=3 a3=0 items=0 ppid=1 pid=4644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:53.146707 kernel: audit: type=1327 audit(1719907013.137:1446): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:53.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:53.148785 sshd[4644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:53.156681 systemd[1]: Started session-27.scope. Jul 2 07:56:53.157152 systemd-logind[1180]: New session 27 of user core. Jul 2 07:56:53.162000 audit[4644]: USER_START pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.165000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.175923 kernel: audit: type=1105 audit(1719907013.162:1447): pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.176102 kernel: audit: type=1103 audit(1719907013.165:1448): pid=4646 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.351126 sshd[4644]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:53.350000 audit[4644]: USER_END pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.356000 audit[4644]: CRED_DISP pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.360266 systemd[1]: sshd@27-137.184.188.4:22-147.75.109.163:41060.service: Deactivated successfully. Jul 2 07:56:53.361187 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 07:56:53.362612 kernel: audit: type=1106 audit(1719907013.350:1449): pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.362851 kernel: audit: type=1104 audit(1719907013.356:1450): pid=4644 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:53.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.188.4:22-147.75.109.163:41060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:53.363375 systemd-logind[1180]: Session 27 logged out. Waiting for processes to exit. Jul 2 07:56:53.364298 systemd-logind[1180]: Removed session 27.