Jul 2 00:58:29.720473 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 00:58:29.720491 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 00:58:29.720499 kernel: efi: EFI v2.70 by EDK II Jul 2 00:58:29.720505 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 2 00:58:29.720510 kernel: random: crng init done Jul 2 00:58:29.720515 kernel: ACPI: Early table checksum verification disabled Jul 2 00:58:29.720521 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 2 00:58:29.720528 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 2 00:58:29.720533 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720539 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720544 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720549 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720554 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720560 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720567 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720589 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720596 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:58:29.720601 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 2 00:58:29.720607 kernel: NUMA: Failed to initialise from firmware Jul 2 00:58:29.720613 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:58:29.720618 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Jul 2 00:58:29.720624 kernel: Zone ranges: Jul 2 00:58:29.720630 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:58:29.720637 kernel: DMA32 empty Jul 2 00:58:29.720642 kernel: Normal empty Jul 2 00:58:29.720648 kernel: Movable zone start for each node Jul 2 00:58:29.720654 kernel: Early memory node ranges Jul 2 00:58:29.720659 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 2 00:58:29.720665 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 2 00:58:29.720671 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 2 00:58:29.720676 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 2 00:58:29.720682 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 2 00:58:29.720687 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 2 00:58:29.720693 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 2 00:58:29.720698 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:58:29.720705 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 2 00:58:29.720711 kernel: psci: probing for conduit method from ACPI. Jul 2 00:58:29.720716 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 00:58:29.720722 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 00:58:29.720728 kernel: psci: Trusted OS migration not required Jul 2 00:58:29.720736 kernel: psci: SMC Calling Convention v1.1 Jul 2 00:58:29.720742 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 2 00:58:29.720749 kernel: ACPI: SRAT not present Jul 2 00:58:29.720755 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 00:58:29.720761 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 00:58:29.720767 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 2 00:58:29.720773 kernel: Detected PIPT I-cache on CPU0 Jul 2 00:58:29.720779 kernel: CPU features: detected: GIC system register CPU interface Jul 2 00:58:29.720785 kernel: CPU features: detected: Hardware dirty bit management Jul 2 00:58:29.720791 kernel: CPU features: detected: Spectre-v4 Jul 2 00:58:29.720796 kernel: CPU features: detected: Spectre-BHB Jul 2 00:58:29.720803 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 00:58:29.720809 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 00:58:29.720815 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 00:58:29.720821 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 2 00:58:29.720827 kernel: Policy zone: DMA Jul 2 00:58:29.720834 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:58:29.720840 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 00:58:29.720846 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 00:58:29.720853 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 00:58:29.720858 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 00:58:29.720865 kernel: Memory: 2457464K/2572288K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 114824K reserved, 0K cma-reserved) Jul 2 00:58:29.720872 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 00:58:29.720878 kernel: trace event string verifier disabled Jul 2 00:58:29.720884 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 00:58:29.720890 kernel: rcu: RCU event tracing is enabled. Jul 2 00:58:29.720897 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 00:58:29.720903 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 00:58:29.720909 kernel: Tracing variant of Tasks RCU enabled. Jul 2 00:58:29.720915 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 00:58:29.720921 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 00:58:29.720926 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 00:58:29.720932 kernel: GICv3: 256 SPIs implemented Jul 2 00:58:29.720939 kernel: GICv3: 0 Extended SPIs implemented Jul 2 00:58:29.720951 kernel: GICv3: Distributor has no Range Selector support Jul 2 00:58:29.720957 kernel: Root IRQ handler: gic_handle_irq Jul 2 00:58:29.720963 kernel: GICv3: 16 PPIs implemented Jul 2 00:58:29.720969 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 2 00:58:29.720974 kernel: ACPI: SRAT not present Jul 2 00:58:29.720980 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 2 00:58:29.720986 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 00:58:29.720992 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 2 00:58:29.720998 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 2 00:58:29.721004 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 2 00:58:29.721010 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:58:29.721017 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 00:58:29.721024 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 00:58:29.721030 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 00:58:29.721035 kernel: arm-pv: using stolen time PV Jul 2 00:58:29.721042 kernel: Console: colour dummy device 80x25 Jul 2 00:58:29.721048 kernel: ACPI: Core revision 20210730 Jul 2 00:58:29.721055 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 00:58:29.721061 kernel: pid_max: default: 32768 minimum: 301 Jul 2 00:58:29.721067 kernel: LSM: Security Framework initializing Jul 2 00:58:29.721073 kernel: SELinux: Initializing. Jul 2 00:58:29.721080 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:58:29.721086 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:58:29.721092 kernel: rcu: Hierarchical SRCU implementation. Jul 2 00:58:29.721098 kernel: Platform MSI: ITS@0x8080000 domain created Jul 2 00:58:29.721104 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 2 00:58:29.721110 kernel: Remapping and enabling EFI services. Jul 2 00:58:29.721116 kernel: smp: Bringing up secondary CPUs ... Jul 2 00:58:29.721122 kernel: Detected PIPT I-cache on CPU1 Jul 2 00:58:29.721129 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 2 00:58:29.721136 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 2 00:58:29.721142 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:58:29.721148 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 00:58:29.721155 kernel: Detected PIPT I-cache on CPU2 Jul 2 00:58:29.721161 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 2 00:58:29.721167 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 2 00:58:29.721173 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:58:29.721179 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 2 00:58:29.721185 kernel: Detected PIPT I-cache on CPU3 Jul 2 00:58:29.721191 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 2 00:58:29.721199 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 2 00:58:29.721205 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:58:29.721211 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 2 00:58:29.721217 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 00:58:29.721227 kernel: SMP: Total of 4 processors activated. Jul 2 00:58:29.721235 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 00:58:29.721241 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 00:58:29.721248 kernel: CPU features: detected: Common not Private translations Jul 2 00:58:29.721254 kernel: CPU features: detected: CRC32 instructions Jul 2 00:58:29.721261 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 00:58:29.721267 kernel: CPU features: detected: LSE atomic instructions Jul 2 00:58:29.721273 kernel: CPU features: detected: Privileged Access Never Jul 2 00:58:29.721281 kernel: CPU features: detected: RAS Extension Support Jul 2 00:58:29.721288 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 2 00:58:29.721294 kernel: CPU: All CPU(s) started at EL1 Jul 2 00:58:29.721300 kernel: alternatives: patching kernel code Jul 2 00:58:29.721308 kernel: devtmpfs: initialized Jul 2 00:58:29.721314 kernel: KASLR enabled Jul 2 00:58:29.721321 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 00:58:29.721328 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 00:58:29.721334 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 00:58:29.721340 kernel: SMBIOS 3.0.0 present. Jul 2 00:58:29.721347 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 2 00:58:29.721353 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 00:58:29.721360 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 00:58:29.721370 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 00:58:29.721378 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 00:58:29.721384 kernel: audit: initializing netlink subsys (disabled) Jul 2 00:58:29.721391 kernel: audit: type=2000 audit(0.036:1): state=initialized audit_enabled=0 res=1 Jul 2 00:58:29.721397 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 00:58:29.721404 kernel: cpuidle: using governor menu Jul 2 00:58:29.721410 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 00:58:29.721417 kernel: ASID allocator initialised with 32768 entries Jul 2 00:58:29.721423 kernel: ACPI: bus type PCI registered Jul 2 00:58:29.721430 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 00:58:29.721437 kernel: Serial: AMBA PL011 UART driver Jul 2 00:58:29.721443 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 00:58:29.721450 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 00:58:29.721456 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 00:58:29.721463 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 00:58:29.721469 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 00:58:29.721476 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 00:58:29.721482 kernel: ACPI: Added _OSI(Module Device) Jul 2 00:58:29.721489 kernel: ACPI: Added _OSI(Processor Device) Jul 2 00:58:29.721496 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 00:58:29.721503 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 00:58:29.721509 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 00:58:29.721516 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 00:58:29.721522 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 00:58:29.721528 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 00:58:29.721535 kernel: ACPI: Interpreter enabled Jul 2 00:58:29.721541 kernel: ACPI: Using GIC for interrupt routing Jul 2 00:58:29.721548 kernel: ACPI: MCFG table detected, 1 entries Jul 2 00:58:29.721555 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 2 00:58:29.721562 kernel: printk: console [ttyAMA0] enabled Jul 2 00:58:29.721568 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 00:58:29.721710 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 00:58:29.721842 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 00:58:29.721902 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 00:58:29.721975 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 2 00:58:29.722042 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 2 00:58:29.722051 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 2 00:58:29.722058 kernel: PCI host bridge to bus 0000:00 Jul 2 00:58:29.722122 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 2 00:58:29.722177 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 00:58:29.722230 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 2 00:58:29.722283 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 00:58:29.722360 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 2 00:58:29.722428 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 00:58:29.722489 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 2 00:58:29.722549 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 2 00:58:29.722631 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:58:29.722693 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:58:29.722753 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 2 00:58:29.722815 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 2 00:58:29.722869 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 2 00:58:29.722922 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 00:58:29.722982 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 2 00:58:29.722991 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 00:58:29.722998 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 00:58:29.723005 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 00:58:29.723013 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 00:58:29.723020 kernel: iommu: Default domain type: Translated Jul 2 00:58:29.723027 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 00:58:29.723033 kernel: vgaarb: loaded Jul 2 00:58:29.723039 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 00:58:29.723046 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 00:58:29.723053 kernel: PTP clock support registered Jul 2 00:58:29.723059 kernel: Registered efivars operations Jul 2 00:58:29.723066 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 00:58:29.723072 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 00:58:29.723080 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 00:58:29.723086 kernel: pnp: PnP ACPI init Jul 2 00:58:29.723152 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 2 00:58:29.723162 kernel: pnp: PnP ACPI: found 1 devices Jul 2 00:58:29.723168 kernel: NET: Registered PF_INET protocol family Jul 2 00:58:29.723175 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 00:58:29.723182 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 00:58:29.723189 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 00:58:29.723197 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 00:58:29.723203 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 00:58:29.723210 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 00:58:29.723216 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:58:29.723223 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:58:29.723229 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 00:58:29.723236 kernel: PCI: CLS 0 bytes, default 64 Jul 2 00:58:29.723242 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 2 00:58:29.723250 kernel: kvm [1]: HYP mode not available Jul 2 00:58:29.723257 kernel: Initialise system trusted keyrings Jul 2 00:58:29.723263 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 00:58:29.723270 kernel: Key type asymmetric registered Jul 2 00:58:29.723276 kernel: Asymmetric key parser 'x509' registered Jul 2 00:58:29.723283 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 00:58:29.723289 kernel: io scheduler mq-deadline registered Jul 2 00:58:29.723296 kernel: io scheduler kyber registered Jul 2 00:58:29.723302 kernel: io scheduler bfq registered Jul 2 00:58:29.723308 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 00:58:29.723316 kernel: ACPI: button: Power Button [PWRB] Jul 2 00:58:29.723323 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 00:58:29.723382 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 2 00:58:29.723391 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 00:58:29.723398 kernel: thunder_xcv, ver 1.0 Jul 2 00:58:29.723404 kernel: thunder_bgx, ver 1.0 Jul 2 00:58:29.723410 kernel: nicpf, ver 1.0 Jul 2 00:58:29.723417 kernel: nicvf, ver 1.0 Jul 2 00:58:29.723482 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 00:58:29.723541 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T00:58:29 UTC (1719881909) Jul 2 00:58:29.723549 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 00:58:29.723556 kernel: NET: Registered PF_INET6 protocol family Jul 2 00:58:29.723562 kernel: Segment Routing with IPv6 Jul 2 00:58:29.723569 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 00:58:29.723604 kernel: NET: Registered PF_PACKET protocol family Jul 2 00:58:29.723611 kernel: Key type dns_resolver registered Jul 2 00:58:29.723618 kernel: registered taskstats version 1 Jul 2 00:58:29.723627 kernel: Loading compiled-in X.509 certificates Jul 2 00:58:29.723633 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 00:58:29.723639 kernel: Key type .fscrypt registered Jul 2 00:58:29.723646 kernel: Key type fscrypt-provisioning registered Jul 2 00:58:29.723653 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 00:58:29.723659 kernel: ima: Allocated hash algorithm: sha1 Jul 2 00:58:29.723666 kernel: ima: No architecture policies found Jul 2 00:58:29.723672 kernel: clk: Disabling unused clocks Jul 2 00:58:29.723678 kernel: Freeing unused kernel memory: 36352K Jul 2 00:58:29.723686 kernel: Run /init as init process Jul 2 00:58:29.723692 kernel: with arguments: Jul 2 00:58:29.723698 kernel: /init Jul 2 00:58:29.723705 kernel: with environment: Jul 2 00:58:29.723711 kernel: HOME=/ Jul 2 00:58:29.723717 kernel: TERM=linux Jul 2 00:58:29.723724 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 00:58:29.723732 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:58:29.723742 systemd[1]: Detected virtualization kvm. Jul 2 00:58:29.723749 systemd[1]: Detected architecture arm64. Jul 2 00:58:29.723756 systemd[1]: Running in initrd. Jul 2 00:58:29.723763 systemd[1]: No hostname configured, using default hostname. Jul 2 00:58:29.723769 systemd[1]: Hostname set to . Jul 2 00:58:29.723777 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:58:29.723783 systemd[1]: Queued start job for default target initrd.target. Jul 2 00:58:29.723790 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:58:29.723798 systemd[1]: Reached target cryptsetup.target. Jul 2 00:58:29.723805 systemd[1]: Reached target paths.target. Jul 2 00:58:29.723812 systemd[1]: Reached target slices.target. Jul 2 00:58:29.723818 systemd[1]: Reached target swap.target. Jul 2 00:58:29.723825 systemd[1]: Reached target timers.target. Jul 2 00:58:29.723832 systemd[1]: Listening on iscsid.socket. Jul 2 00:58:29.723839 systemd[1]: Listening on iscsiuio.socket. Jul 2 00:58:29.723847 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 00:58:29.723854 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 00:58:29.723861 systemd[1]: Listening on systemd-journald.socket. Jul 2 00:58:29.723868 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:58:29.723875 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:58:29.723882 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:58:29.723889 systemd[1]: Reached target sockets.target. Jul 2 00:58:29.723895 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:58:29.723903 systemd[1]: Finished network-cleanup.service. Jul 2 00:58:29.723911 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 00:58:29.723918 systemd[1]: Starting systemd-journald.service... Jul 2 00:58:29.723924 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:58:29.723931 systemd[1]: Starting systemd-resolved.service... Jul 2 00:58:29.723938 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 00:58:29.723950 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:58:29.723957 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 00:58:29.723964 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:58:29.723971 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 00:58:29.723980 kernel: audit: type=1130 audit(1719881909.719:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.723987 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:58:29.723994 kernel: audit: type=1130 audit(1719881909.722:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.724004 systemd-journald[290]: Journal started Jul 2 00:58:29.724046 systemd-journald[290]: Runtime Journal (/run/log/journal/b91e9dc489204394a8dfcf8744f51096) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:58:29.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.716502 systemd-modules-load[291]: Inserted module 'overlay' Jul 2 00:58:29.725755 systemd[1]: Started systemd-journald.service. Jul 2 00:58:29.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.727918 kernel: audit: type=1130 audit(1719881909.725:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.728736 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 00:58:29.736598 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 00:58:29.739951 systemd-modules-load[291]: Inserted module 'br_netfilter' Jul 2 00:58:29.740585 kernel: Bridge firewalling registered Jul 2 00:58:29.741833 systemd-resolved[292]: Positive Trust Anchors: Jul 2 00:58:29.741844 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:58:29.741872 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:58:29.745872 systemd-resolved[292]: Defaulting to hostname 'linux'. Jul 2 00:58:29.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.746650 systemd[1]: Started systemd-resolved.service. Jul 2 00:58:29.752026 kernel: audit: type=1130 audit(1719881909.748:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.751513 systemd[1]: Reached target nss-lookup.target. Jul 2 00:58:29.753606 kernel: SCSI subsystem initialized Jul 2 00:58:29.755647 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 00:58:29.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.758585 kernel: audit: type=1130 audit(1719881909.755:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.759028 systemd[1]: Starting dracut-cmdline.service... Jul 2 00:58:29.762310 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 00:58:29.762325 kernel: device-mapper: uevent: version 1.0.3 Jul 2 00:58:29.762333 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 00:58:29.764411 systemd-modules-load[291]: Inserted module 'dm_multipath' Jul 2 00:58:29.765128 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:58:29.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.767938 dracut-cmdline[308]: dracut-dracut-053 Jul 2 00:58:29.768463 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:58:29.769520 kernel: audit: type=1130 audit(1719881909.765:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.770297 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:58:29.774694 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:58:29.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.777734 kernel: audit: type=1130 audit(1719881909.774:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.828592 kernel: Loading iSCSI transport class v2.0-870. Jul 2 00:58:29.840602 kernel: iscsi: registered transport (tcp) Jul 2 00:58:29.855599 kernel: iscsi: registered transport (qla4xxx) Jul 2 00:58:29.855632 kernel: QLogic iSCSI HBA Driver Jul 2 00:58:29.897362 systemd[1]: Finished dracut-cmdline.service. Jul 2 00:58:29.898864 systemd[1]: Starting dracut-pre-udev.service... Jul 2 00:58:29.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.902618 kernel: audit: type=1130 audit(1719881909.897:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:29.944599 kernel: raid6: neonx8 gen() 13835 MB/s Jul 2 00:58:29.960587 kernel: raid6: neonx8 xor() 10832 MB/s Jul 2 00:58:29.977596 kernel: raid6: neonx4 gen() 13532 MB/s Jul 2 00:58:29.994600 kernel: raid6: neonx4 xor() 11317 MB/s Jul 2 00:58:30.011601 kernel: raid6: neonx2 gen() 12959 MB/s Jul 2 00:58:30.028607 kernel: raid6: neonx2 xor() 10618 MB/s Jul 2 00:58:30.045595 kernel: raid6: neonx1 gen() 10543 MB/s Jul 2 00:58:30.062598 kernel: raid6: neonx1 xor() 8748 MB/s Jul 2 00:58:30.079594 kernel: raid6: int64x8 gen() 6266 MB/s Jul 2 00:58:30.096600 kernel: raid6: int64x8 xor() 3524 MB/s Jul 2 00:58:30.113607 kernel: raid6: int64x4 gen() 7245 MB/s Jul 2 00:58:30.130587 kernel: raid6: int64x4 xor() 3843 MB/s Jul 2 00:58:30.147596 kernel: raid6: int64x2 gen() 6142 MB/s Jul 2 00:58:30.164594 kernel: raid6: int64x2 xor() 3309 MB/s Jul 2 00:58:30.181600 kernel: raid6: int64x1 gen() 5037 MB/s Jul 2 00:58:30.198784 kernel: raid6: int64x1 xor() 2646 MB/s Jul 2 00:58:30.198818 kernel: raid6: using algorithm neonx8 gen() 13835 MB/s Jul 2 00:58:30.198828 kernel: raid6: .... xor() 10832 MB/s, rmw enabled Jul 2 00:58:30.198837 kernel: raid6: using neon recovery algorithm Jul 2 00:58:30.209841 kernel: xor: measuring software checksum speed Jul 2 00:58:30.209873 kernel: 8regs : 17311 MB/sec Jul 2 00:58:30.210675 kernel: 32regs : 20770 MB/sec Jul 2 00:58:30.211827 kernel: arm64_neon : 27892 MB/sec Jul 2 00:58:30.211846 kernel: xor: using function: arm64_neon (27892 MB/sec) Jul 2 00:58:30.268609 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 00:58:30.278928 systemd[1]: Finished dracut-pre-udev.service. Jul 2 00:58:30.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:30.281000 audit: BPF prog-id=7 op=LOAD Jul 2 00:58:30.281000 audit: BPF prog-id=8 op=LOAD Jul 2 00:58:30.282079 systemd[1]: Starting systemd-udevd.service... Jul 2 00:58:30.283089 kernel: audit: type=1130 audit(1719881910.278:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:30.295459 systemd-udevd[491]: Using default interface naming scheme 'v252'. Jul 2 00:58:30.298843 systemd[1]: Started systemd-udevd.service. Jul 2 00:58:30.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:30.300764 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 00:58:30.312603 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Jul 2 00:58:30.338326 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 00:58:30.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:30.339670 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:58:30.373128 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:58:30.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:30.396668 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 2 00:58:30.401666 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 00:58:30.401699 kernel: GPT:9289727 != 19775487 Jul 2 00:58:30.401709 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 00:58:30.402979 kernel: GPT:9289727 != 19775487 Jul 2 00:58:30.403002 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 00:58:30.403012 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:58:30.415599 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (542) Jul 2 00:58:30.419706 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 00:58:30.425017 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:58:30.428973 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 00:58:30.432384 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 00:58:30.433249 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 00:58:30.435603 systemd[1]: Starting disk-uuid.service... Jul 2 00:58:30.441934 disk-uuid[560]: Primary Header is updated. Jul 2 00:58:30.441934 disk-uuid[560]: Secondary Entries is updated. Jul 2 00:58:30.441934 disk-uuid[560]: Secondary Header is updated. Jul 2 00:58:30.444594 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:58:31.463597 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:58:31.463917 disk-uuid[561]: The operation has completed successfully. Jul 2 00:58:31.489833 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 00:58:31.489924 systemd[1]: Finished disk-uuid.service. Jul 2 00:58:31.491257 systemd[1]: Starting verity-setup.service... Jul 2 00:58:31.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.505599 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 00:58:31.524654 systemd[1]: Found device dev-mapper-usr.device. Jul 2 00:58:31.525893 systemd[1]: Mounting sysusr-usr.mount... Jul 2 00:58:31.526508 systemd[1]: Finished verity-setup.service. Jul 2 00:58:31.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.573258 systemd[1]: Mounted sysusr-usr.mount. Jul 2 00:58:31.574231 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:58:31.573885 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 00:58:31.574481 systemd[1]: Starting ignition-setup.service... Jul 2 00:58:31.576185 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 00:58:31.583602 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:58:31.583632 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:58:31.583642 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:58:31.591874 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 00:58:31.597909 systemd[1]: Finished ignition-setup.service. Jul 2 00:58:31.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.599137 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 00:58:31.649334 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 00:58:31.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.651000 audit: BPF prog-id=9 op=LOAD Jul 2 00:58:31.652379 systemd[1]: Starting systemd-networkd.service... Jul 2 00:58:31.683630 ignition[657]: Ignition 2.14.0 Jul 2 00:58:31.684474 ignition[657]: Stage: fetch-offline Jul 2 00:58:31.685069 ignition[657]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:31.685740 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:31.686623 ignition[657]: parsed url from cmdline: "" Jul 2 00:58:31.686677 ignition[657]: no config URL provided Jul 2 00:58:31.687180 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 00:58:31.687275 systemd-networkd[737]: lo: Link UP Jul 2 00:58:31.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.687279 systemd-networkd[737]: lo: Gained carrier Jul 2 00:58:31.687635 systemd-networkd[737]: Enumeration completed Jul 2 00:58:31.687704 systemd[1]: Started systemd-networkd.service. Jul 2 00:58:31.687803 systemd-networkd[737]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:58:31.688844 systemd-networkd[737]: eth0: Link UP Jul 2 00:58:31.688847 systemd-networkd[737]: eth0: Gained carrier Jul 2 00:58:31.689054 systemd[1]: Reached target network.target. Jul 2 00:58:31.690530 systemd[1]: Starting iscsiuio.service... Jul 2 00:58:31.694713 ignition[657]: no config at "/usr/lib/ignition/user.ign" Jul 2 00:58:31.694735 ignition[657]: op(1): [started] loading QEMU firmware config module Jul 2 00:58:31.694740 ignition[657]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 00:58:31.700068 ignition[657]: op(1): [finished] loading QEMU firmware config module Jul 2 00:58:31.701707 systemd[1]: Started iscsiuio.service. Jul 2 00:58:31.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.703052 systemd[1]: Starting iscsid.service... Jul 2 00:58:31.706464 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:58:31.706464 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 00:58:31.706464 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 00:58:31.706464 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 00:58:31.706464 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:58:31.706464 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 00:58:31.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.709413 systemd-networkd[737]: eth0: DHCPv4 address 10.0.0.115/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:58:31.711746 systemd[1]: Started iscsid.service. Jul 2 00:58:31.713046 systemd[1]: Starting dracut-initqueue.service... Jul 2 00:58:31.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.722653 systemd[1]: Finished dracut-initqueue.service. Jul 2 00:58:31.723436 systemd[1]: Reached target remote-fs-pre.target. Jul 2 00:58:31.724173 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:58:31.724893 systemd[1]: Reached target remote-fs.target. Jul 2 00:58:31.726152 systemd[1]: Starting dracut-pre-mount.service... Jul 2 00:58:31.733332 systemd[1]: Finished dracut-pre-mount.service. Jul 2 00:58:31.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.753069 ignition[657]: parsing config with SHA512: b544a0891560fe2fdef037b2cd5d59d3564b2a7b46c2e8aa3e56806309cde3214bbaa4039b6182fa53578d8035feaa55bb89a059df739ffc54f8be63ac90901f Jul 2 00:58:31.760651 unknown[657]: fetched base config from "system" Jul 2 00:58:31.760663 unknown[657]: fetched user config from "qemu" Jul 2 00:58:31.761153 ignition[657]: fetch-offline: fetch-offline passed Jul 2 00:58:31.761216 ignition[657]: Ignition finished successfully Jul 2 00:58:31.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.762102 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 00:58:31.763020 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 00:58:31.763650 systemd[1]: Starting ignition-kargs.service... Jul 2 00:58:31.772350 ignition[760]: Ignition 2.14.0 Jul 2 00:58:31.772359 ignition[760]: Stage: kargs Jul 2 00:58:31.772439 ignition[760]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:31.772448 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:31.773318 ignition[760]: kargs: kargs passed Jul 2 00:58:31.774816 systemd[1]: Finished ignition-kargs.service. Jul 2 00:58:31.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.773353 ignition[760]: Ignition finished successfully Jul 2 00:58:31.776288 systemd[1]: Starting ignition-disks.service... Jul 2 00:58:31.782128 ignition[766]: Ignition 2.14.0 Jul 2 00:58:31.782137 ignition[766]: Stage: disks Jul 2 00:58:31.782216 ignition[766]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:31.782225 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:31.783009 ignition[766]: disks: disks passed Jul 2 00:58:31.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.784398 systemd[1]: Finished ignition-disks.service. Jul 2 00:58:31.783046 ignition[766]: Ignition finished successfully Jul 2 00:58:31.785630 systemd[1]: Reached target initrd-root-device.target. Jul 2 00:58:31.786455 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:58:31.787400 systemd[1]: Reached target local-fs.target. Jul 2 00:58:31.788316 systemd[1]: Reached target sysinit.target. Jul 2 00:58:31.789276 systemd[1]: Reached target basic.target. Jul 2 00:58:31.790986 systemd[1]: Starting systemd-fsck-root.service... Jul 2 00:58:31.801119 systemd-fsck[774]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 00:58:31.804225 systemd[1]: Finished systemd-fsck-root.service. Jul 2 00:58:31.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.807647 systemd[1]: Mounting sysroot.mount... Jul 2 00:58:31.813585 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 00:58:31.813968 systemd[1]: Mounted sysroot.mount. Jul 2 00:58:31.814522 systemd[1]: Reached target initrd-root-fs.target. Jul 2 00:58:31.816249 systemd[1]: Mounting sysroot-usr.mount... Jul 2 00:58:31.816959 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 00:58:31.816994 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 00:58:31.817015 systemd[1]: Reached target ignition-diskful.target. Jul 2 00:58:31.818791 systemd[1]: Mounted sysroot-usr.mount. Jul 2 00:58:31.820836 systemd[1]: Starting initrd-setup-root.service... Jul 2 00:58:31.824798 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 00:58:31.829032 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory Jul 2 00:58:31.832561 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 00:58:31.836208 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 00:58:31.860873 systemd[1]: Finished initrd-setup-root.service. Jul 2 00:58:31.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.862140 systemd[1]: Starting ignition-mount.service... Jul 2 00:58:31.863248 systemd[1]: Starting sysroot-boot.service... Jul 2 00:58:31.868133 bash[825]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 00:58:31.876285 ignition[827]: INFO : Ignition 2.14.0 Jul 2 00:58:31.876285 ignition[827]: INFO : Stage: mount Jul 2 00:58:31.878147 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:31.878147 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:31.878147 ignition[827]: INFO : mount: mount passed Jul 2 00:58:31.878147 ignition[827]: INFO : Ignition finished successfully Jul 2 00:58:31.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.878357 systemd[1]: Finished ignition-mount.service. Jul 2 00:58:31.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:31.881204 systemd[1]: Finished sysroot-boot.service. Jul 2 00:58:32.533242 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:58:32.539776 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) Jul 2 00:58:32.539808 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:58:32.539818 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:58:32.540723 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:58:32.543494 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:58:32.544770 systemd[1]: Starting ignition-files.service... Jul 2 00:58:32.558320 ignition[855]: INFO : Ignition 2.14.0 Jul 2 00:58:32.558320 ignition[855]: INFO : Stage: files Jul 2 00:58:32.559433 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:32.559433 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:32.559433 ignition[855]: DEBUG : files: compiled without relabeling support, skipping Jul 2 00:58:32.561922 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 00:58:32.561922 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 00:58:32.564279 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 00:58:32.565263 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 00:58:32.565263 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 00:58:32.564955 unknown[855]: wrote ssh authorized keys file for user: core Jul 2 00:58:32.567958 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:58:32.567958 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 2 00:58:32.587284 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 00:58:32.639103 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:58:32.640635 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Jul 2 00:58:32.940182 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 2 00:58:33.166425 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:58:33.166425 ignition[855]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 00:58:33.169009 ignition[855]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:58:33.204456 ignition[855]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:58:33.206434 ignition[855]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 00:58:33.206434 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:58:33.206434 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:58:33.206434 ignition[855]: INFO : files: files passed Jul 2 00:58:33.206434 ignition[855]: INFO : Ignition finished successfully Jul 2 00:58:33.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.206475 systemd[1]: Finished ignition-files.service. Jul 2 00:58:33.208931 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 00:58:33.209766 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 00:58:33.215098 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 00:58:33.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.210405 systemd[1]: Starting ignition-quench.service... Jul 2 00:58:33.213809 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 00:58:33.217788 initrd-setup-root-after-ignition[882]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 00:58:33.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.213895 systemd[1]: Finished ignition-quench.service. Jul 2 00:58:33.217598 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 00:58:33.218506 systemd[1]: Reached target ignition-complete.target. Jul 2 00:58:33.220558 systemd[1]: Starting initrd-parse-etc.service... Jul 2 00:58:33.232215 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 00:58:33.232302 systemd[1]: Finished initrd-parse-etc.service. Jul 2 00:58:33.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.233533 systemd[1]: Reached target initrd-fs.target. Jul 2 00:58:33.234383 systemd[1]: Reached target initrd.target. Jul 2 00:58:33.235321 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 00:58:33.236017 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 00:58:33.245838 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 00:58:33.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.247137 systemd[1]: Starting initrd-cleanup.service... Jul 2 00:58:33.254504 systemd[1]: Stopped target nss-lookup.target. Jul 2 00:58:33.255241 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 00:58:33.256244 systemd[1]: Stopped target timers.target. Jul 2 00:58:33.257184 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 00:58:33.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.257278 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 00:58:33.258229 systemd[1]: Stopped target initrd.target. Jul 2 00:58:33.259195 systemd[1]: Stopped target basic.target. Jul 2 00:58:33.260113 systemd[1]: Stopped target ignition-complete.target. Jul 2 00:58:33.261082 systemd[1]: Stopped target ignition-diskful.target. Jul 2 00:58:33.262057 systemd[1]: Stopped target initrd-root-device.target. Jul 2 00:58:33.263138 systemd[1]: Stopped target remote-fs.target. Jul 2 00:58:33.264135 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 00:58:33.265172 systemd[1]: Stopped target sysinit.target. Jul 2 00:58:33.266092 systemd[1]: Stopped target local-fs.target. Jul 2 00:58:33.267171 systemd[1]: Stopped target local-fs-pre.target. Jul 2 00:58:33.268136 systemd[1]: Stopped target swap.target. Jul 2 00:58:33.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.269101 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 00:58:33.269193 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 00:58:33.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.270185 systemd[1]: Stopped target cryptsetup.target. Jul 2 00:58:33.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.271009 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 00:58:33.271101 systemd[1]: Stopped dracut-initqueue.service. Jul 2 00:58:33.272188 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 00:58:33.272278 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 00:58:33.273227 systemd[1]: Stopped target paths.target. Jul 2 00:58:33.274112 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 00:58:33.277605 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 00:58:33.278295 systemd[1]: Stopped target slices.target. Jul 2 00:58:33.279252 systemd[1]: Stopped target sockets.target. Jul 2 00:58:33.280205 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 00:58:33.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.280304 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 00:58:33.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.281320 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 00:58:33.281409 systemd[1]: Stopped ignition-files.service. Jul 2 00:58:33.284535 iscsid[745]: iscsid shutting down. Jul 2 00:58:33.283192 systemd[1]: Stopping ignition-mount.service... Jul 2 00:58:33.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.284250 systemd[1]: Stopping iscsid.service... Jul 2 00:58:33.284922 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 00:58:33.285031 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 00:58:33.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.286649 systemd[1]: Stopping sysroot-boot.service... Jul 2 00:58:33.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.287401 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 00:58:33.291505 ignition[895]: INFO : Ignition 2.14.0 Jul 2 00:58:33.291505 ignition[895]: INFO : Stage: umount Jul 2 00:58:33.291505 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:58:33.291505 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:58:33.291505 ignition[895]: INFO : umount: umount passed Jul 2 00:58:33.291505 ignition[895]: INFO : Ignition finished successfully Jul 2 00:58:33.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.287523 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 00:58:33.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.288661 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 00:58:33.288752 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 00:58:33.291076 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 00:58:33.291174 systemd[1]: Stopped iscsid.service. Jul 2 00:58:33.292498 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 00:58:33.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.292617 systemd[1]: Stopped ignition-mount.service. Jul 2 00:58:33.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.294022 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 00:58:33.294102 systemd[1]: Closed iscsid.socket. Jul 2 00:58:33.294756 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 00:58:33.294792 systemd[1]: Stopped ignition-disks.service. Jul 2 00:58:33.296284 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 00:58:33.296322 systemd[1]: Stopped ignition-kargs.service. Jul 2 00:58:33.297413 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 00:58:33.297450 systemd[1]: Stopped ignition-setup.service. Jul 2 00:58:33.298608 systemd[1]: Stopping iscsiuio.service... Jul 2 00:58:33.300323 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 00:58:33.301356 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 00:58:33.301454 systemd[1]: Stopped iscsiuio.service. Jul 2 00:58:33.302664 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 00:58:33.302744 systemd[1]: Finished initrd-cleanup.service. Jul 2 00:58:33.304408 systemd[1]: Stopped target network.target. Jul 2 00:58:33.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.305242 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 00:58:33.305272 systemd[1]: Closed iscsiuio.socket. Jul 2 00:58:33.306289 systemd[1]: Stopping systemd-networkd.service... Jul 2 00:58:33.307399 systemd[1]: Stopping systemd-resolved.service... Jul 2 00:58:33.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.311635 systemd-networkd[737]: eth0: DHCPv6 lease lost Jul 2 00:58:33.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.313378 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 00:58:33.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.322000 audit: BPF prog-id=9 op=UNLOAD Jul 2 00:58:33.313475 systemd[1]: Stopped systemd-networkd.service. Jul 2 00:58:33.314873 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 00:58:33.314901 systemd[1]: Closed systemd-networkd.socket. Jul 2 00:58:33.317313 systemd[1]: Stopping network-cleanup.service... Jul 2 00:58:33.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.318129 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 00:58:33.318181 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 00:58:33.319215 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 00:58:33.319251 systemd[1]: Stopped systemd-sysctl.service. Jul 2 00:58:33.330000 audit: BPF prog-id=6 op=UNLOAD Jul 2 00:58:33.320709 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 00:58:33.320749 systemd[1]: Stopped systemd-modules-load.service. Jul 2 00:58:33.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.321469 systemd[1]: Stopping systemd-udevd.service... Jul 2 00:58:33.326304 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 00:58:33.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.326742 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 00:58:33.326829 systemd[1]: Stopped systemd-resolved.service. Jul 2 00:58:33.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.331229 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 00:58:33.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.331351 systemd[1]: Stopped systemd-udevd.service. Jul 2 00:58:33.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.332694 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 00:58:33.332771 systemd[1]: Stopped network-cleanup.service. Jul 2 00:58:33.333490 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 00:58:33.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.333521 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 00:58:33.334383 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 00:58:33.334411 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 00:58:33.335620 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 00:58:33.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.335655 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 00:58:33.336704 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 00:58:33.336737 systemd[1]: Stopped dracut-cmdline.service. Jul 2 00:58:33.337617 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 00:58:33.337649 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 00:58:33.339317 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 00:58:33.340270 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 00:58:33.340320 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 00:58:33.341616 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 00:58:33.341698 systemd[1]: Stopped sysroot-boot.service. Jul 2 00:58:33.342548 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 00:58:33.342601 systemd[1]: Stopped initrd-setup-root.service. Jul 2 00:58:33.344348 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 00:58:33.344413 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 00:58:33.345253 systemd[1]: Reached target initrd-switch-root.target. Jul 2 00:58:33.346955 systemd[1]: Starting initrd-switch-root.service... Jul 2 00:58:33.352907 systemd[1]: Switching root. Jul 2 00:58:33.363602 systemd-journald[290]: Journal stopped Jul 2 00:58:35.317742 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Jul 2 00:58:35.317798 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 00:58:35.317811 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 00:58:35.317822 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 00:58:35.317833 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 00:58:35.317844 kernel: SELinux: policy capability open_perms=1 Jul 2 00:58:35.317855 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 00:58:35.317868 kernel: SELinux: policy capability always_check_network=0 Jul 2 00:58:35.317878 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 00:58:35.317887 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 00:58:35.317897 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 00:58:35.317906 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 00:58:35.317917 systemd[1]: Successfully loaded SELinux policy in 31.030ms. Jul 2 00:58:35.317943 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.869ms. Jul 2 00:58:35.317956 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:58:35.317968 systemd[1]: Detected virtualization kvm. Jul 2 00:58:35.317979 systemd[1]: Detected architecture arm64. Jul 2 00:58:35.317989 systemd[1]: Detected first boot. Jul 2 00:58:35.318000 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:58:35.318010 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 00:58:35.318021 systemd[1]: Populated /etc with preset unit settings. Jul 2 00:58:35.318032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:58:35.318044 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:58:35.318056 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:58:35.318067 kernel: kauditd_printk_skb: 80 callbacks suppressed Jul 2 00:58:35.318076 kernel: audit: type=1334 audit(1719881915.193:84): prog-id=12 op=LOAD Jul 2 00:58:35.318086 kernel: audit: type=1334 audit(1719881915.193:85): prog-id=3 op=UNLOAD Jul 2 00:58:35.318096 kernel: audit: type=1334 audit(1719881915.194:86): prog-id=13 op=LOAD Jul 2 00:58:35.318106 kernel: audit: type=1334 audit(1719881915.194:87): prog-id=14 op=LOAD Jul 2 00:58:35.318115 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 00:58:35.318128 kernel: audit: type=1334 audit(1719881915.194:88): prog-id=4 op=UNLOAD Jul 2 00:58:35.318140 kernel: audit: type=1334 audit(1719881915.194:89): prog-id=5 op=UNLOAD Jul 2 00:58:35.318150 kernel: audit: type=1131 audit(1719881915.195:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.318160 systemd[1]: Stopped initrd-switch-root.service. Jul 2 00:58:35.318171 kernel: audit: type=1130 audit(1719881915.201:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.318182 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 00:58:35.318193 kernel: audit: type=1131 audit(1719881915.201:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.318203 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 00:58:35.318213 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 00:58:35.318223 systemd[1]: Created slice system-getty.slice. Jul 2 00:58:35.318234 systemd[1]: Created slice system-modprobe.slice. Jul 2 00:58:35.318245 kernel: audit: type=1334 audit(1719881915.211:93): prog-id=12 op=UNLOAD Jul 2 00:58:35.318257 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 00:58:35.318269 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 00:58:35.318280 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 00:58:35.318290 systemd[1]: Created slice user.slice. Jul 2 00:58:35.318300 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:58:35.318311 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 00:58:35.318321 systemd[1]: Set up automount boot.automount. Jul 2 00:58:35.318332 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 00:58:35.318343 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 00:58:35.318353 systemd[1]: Stopped target initrd-fs.target. Jul 2 00:58:35.318364 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 00:58:35.318374 systemd[1]: Reached target integritysetup.target. Jul 2 00:58:35.318384 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:58:35.318395 systemd[1]: Reached target remote-fs.target. Jul 2 00:58:35.318405 systemd[1]: Reached target slices.target. Jul 2 00:58:35.318415 systemd[1]: Reached target swap.target. Jul 2 00:58:35.318425 systemd[1]: Reached target torcx.target. Jul 2 00:58:35.318440 systemd[1]: Reached target veritysetup.target. Jul 2 00:58:35.318452 systemd[1]: Listening on systemd-coredump.socket. Jul 2 00:58:35.318462 systemd[1]: Listening on systemd-initctl.socket. Jul 2 00:58:35.318473 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:58:35.320046 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:58:35.320070 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:58:35.320081 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 00:58:35.320093 systemd[1]: Mounting dev-hugepages.mount... Jul 2 00:58:35.320103 systemd[1]: Mounting dev-mqueue.mount... Jul 2 00:58:35.320114 systemd[1]: Mounting media.mount... Jul 2 00:58:35.320129 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 00:58:35.320141 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 00:58:35.320151 systemd[1]: Mounting tmp.mount... Jul 2 00:58:35.320161 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 00:58:35.320172 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:58:35.320183 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:58:35.320193 systemd[1]: Starting modprobe@configfs.service... Jul 2 00:58:35.320204 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:58:35.320224 systemd[1]: Starting modprobe@drm.service... Jul 2 00:58:35.320237 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:58:35.320247 systemd[1]: Starting modprobe@fuse.service... Jul 2 00:58:35.320258 systemd[1]: Starting modprobe@loop.service... Jul 2 00:58:35.320269 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 00:58:35.320280 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 00:58:35.320291 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 00:58:35.320304 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 00:58:35.320315 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 00:58:35.320336 systemd[1]: Stopped systemd-journald.service. Jul 2 00:58:35.320347 systemd[1]: Starting systemd-journald.service... Jul 2 00:58:35.320357 kernel: fuse: init (API version 7.34) Jul 2 00:58:35.320369 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:58:35.320381 systemd[1]: Starting systemd-network-generator.service... Jul 2 00:58:35.320392 systemd[1]: Starting systemd-remount-fs.service... Jul 2 00:58:35.320402 kernel: loop: module loaded Jul 2 00:58:35.320412 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:58:35.320422 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 00:58:35.320433 systemd[1]: Stopped verity-setup.service. Jul 2 00:58:35.320443 systemd[1]: Mounted dev-hugepages.mount. Jul 2 00:58:35.320454 systemd[1]: Mounted dev-mqueue.mount. Jul 2 00:58:35.320465 systemd[1]: Mounted media.mount. Jul 2 00:58:35.320475 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 00:58:35.320485 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 00:58:35.320495 systemd[1]: Mounted tmp.mount. Jul 2 00:58:35.320506 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:58:35.320516 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 00:58:35.320528 systemd-journald[985]: Journal started Jul 2 00:58:35.320625 systemd-journald[985]: Runtime Journal (/run/log/journal/b91e9dc489204394a8dfcf8744f51096) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:58:35.320660 systemd[1]: Finished modprobe@configfs.service. Jul 2 00:58:33.420000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 00:58:33.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:58:33.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:58:33.500000 audit: BPF prog-id=10 op=LOAD Jul 2 00:58:33.500000 audit: BPF prog-id=10 op=UNLOAD Jul 2 00:58:33.500000 audit: BPF prog-id=11 op=LOAD Jul 2 00:58:33.500000 audit: BPF prog-id=11 op=UNLOAD Jul 2 00:58:33.540000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 00:58:33.540000 audit[928]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022314 a1=40000283d8 a2=4000026840 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:33.540000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:58:33.541000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 00:58:33.541000 audit[928]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000223f9 a2=1ed a3=0 items=2 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:33.541000 audit: CWD cwd="/" Jul 2 00:58:33.541000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:58:33.541000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:58:33.541000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:58:35.193000 audit: BPF prog-id=12 op=LOAD Jul 2 00:58:35.193000 audit: BPF prog-id=3 op=UNLOAD Jul 2 00:58:35.194000 audit: BPF prog-id=13 op=LOAD Jul 2 00:58:35.194000 audit: BPF prog-id=14 op=LOAD Jul 2 00:58:35.194000 audit: BPF prog-id=4 op=UNLOAD Jul 2 00:58:35.194000 audit: BPF prog-id=5 op=UNLOAD Jul 2 00:58:35.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.211000 audit: BPF prog-id=12 op=UNLOAD Jul 2 00:58:35.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.282000 audit: BPF prog-id=15 op=LOAD Jul 2 00:58:35.286000 audit: BPF prog-id=16 op=LOAD Jul 2 00:58:35.289000 audit: BPF prog-id=17 op=LOAD Jul 2 00:58:35.289000 audit: BPF prog-id=13 op=UNLOAD Jul 2 00:58:35.289000 audit: BPF prog-id=14 op=UNLOAD Jul 2 00:58:35.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.315000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 00:58:35.315000 audit[985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffcab37570 a2=4000 a3=1 items=0 ppid=1 pid=985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:35.315000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 00:58:35.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.539082 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:58:35.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.192478 systemd[1]: Queued start job for default target multi-user.target. Jul 2 00:58:33.539298 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:58:35.192490 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 00:58:33.539315 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:58:35.195973 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 00:58:33.539342 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 00:58:33.539351 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 00:58:33.539376 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 00:58:33.539386 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 00:58:33.539589 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 00:58:33.539625 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:58:33.539637 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:58:33.540269 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 00:58:33.540473 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 00:58:35.322687 systemd[1]: Started systemd-journald.service. Jul 2 00:58:33.540499 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 00:58:35.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:33.540514 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 00:58:33.540532 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 00:58:33.540545 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 00:58:34.952631 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:58:34.952882 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:58:34.952996 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:58:34.953157 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:58:35.323262 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:58:34.953204 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 00:58:34.953257 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-07-02T00:58:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 00:58:35.323423 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:58:35.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.324363 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:58:35.324523 systemd[1]: Finished modprobe@drm.service. Jul 2 00:58:35.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.325491 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:58:35.325662 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:58:35.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.326500 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 00:58:35.328887 systemd[1]: Finished modprobe@fuse.service. Jul 2 00:58:35.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.329724 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:58:35.329865 systemd[1]: Finished modprobe@loop.service. Jul 2 00:58:35.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.330828 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:58:35.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.331736 systemd[1]: Finished systemd-network-generator.service. Jul 2 00:58:35.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.332665 systemd[1]: Finished systemd-remount-fs.service. Jul 2 00:58:35.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.333696 systemd[1]: Reached target network-pre.target. Jul 2 00:58:35.335472 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 00:58:35.337257 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 00:58:35.337855 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 00:58:35.340663 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 00:58:35.342309 systemd[1]: Starting systemd-journal-flush.service... Jul 2 00:58:35.343091 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:58:35.344057 systemd[1]: Starting systemd-random-seed.service... Jul 2 00:58:35.344698 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:58:35.345776 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:58:35.347762 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 00:58:35.349060 systemd-journald[985]: Time spent on flushing to /var/log/journal/b91e9dc489204394a8dfcf8744f51096 is 20.011ms for 983 entries. Jul 2 00:58:35.349060 systemd-journald[985]: System Journal (/var/log/journal/b91e9dc489204394a8dfcf8744f51096) is 8.0M, max 195.6M, 187.6M free. Jul 2 00:58:35.378570 systemd-journald[985]: Received client request to flush runtime journal. Jul 2 00:58:35.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.350485 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 00:58:35.351781 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 00:58:35.353814 systemd[1]: Starting systemd-sysusers.service... Jul 2 00:58:35.380212 udevadm[1029]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 00:58:35.354714 systemd[1]: Finished systemd-random-seed.service. Jul 2 00:58:35.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.355482 systemd[1]: Reached target first-boot-complete.target. Jul 2 00:58:35.359541 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:58:35.361380 systemd[1]: Starting systemd-udev-settle.service... Jul 2 00:58:35.364941 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:58:35.379645 systemd[1]: Finished systemd-journal-flush.service. Jul 2 00:58:35.382624 systemd[1]: Finished systemd-sysusers.service. Jul 2 00:58:35.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.701954 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 00:58:35.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.702000 audit: BPF prog-id=18 op=LOAD Jul 2 00:58:35.702000 audit: BPF prog-id=19 op=LOAD Jul 2 00:58:35.702000 audit: BPF prog-id=7 op=UNLOAD Jul 2 00:58:35.702000 audit: BPF prog-id=8 op=UNLOAD Jul 2 00:58:35.703900 systemd[1]: Starting systemd-udevd.service... Jul 2 00:58:35.719189 systemd-udevd[1031]: Using default interface naming scheme 'v252'. Jul 2 00:58:35.732300 systemd[1]: Started systemd-udevd.service. Jul 2 00:58:35.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.733000 audit: BPF prog-id=20 op=LOAD Jul 2 00:58:35.734488 systemd[1]: Starting systemd-networkd.service... Jul 2 00:58:35.741000 audit: BPF prog-id=21 op=LOAD Jul 2 00:58:35.741000 audit: BPF prog-id=22 op=LOAD Jul 2 00:58:35.741000 audit: BPF prog-id=23 op=LOAD Jul 2 00:58:35.743026 systemd[1]: Starting systemd-userdbd.service... Jul 2 00:58:35.764067 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 00:58:35.782501 systemd[1]: Started systemd-userdbd.service. Jul 2 00:58:35.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.826908 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:58:35.830002 systemd-networkd[1038]: lo: Link UP Jul 2 00:58:35.830015 systemd-networkd[1038]: lo: Gained carrier Jul 2 00:58:35.830350 systemd-networkd[1038]: Enumeration completed Jul 2 00:58:35.830444 systemd[1]: Started systemd-networkd.service. Jul 2 00:58:35.830457 systemd-networkd[1038]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:58:35.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.831552 systemd-networkd[1038]: eth0: Link UP Jul 2 00:58:35.831564 systemd-networkd[1038]: eth0: Gained carrier Jul 2 00:58:35.832038 systemd[1]: Finished systemd-udev-settle.service. Jul 2 00:58:35.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.833748 systemd[1]: Starting lvm2-activation-early.service... Jul 2 00:58:35.841762 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:58:35.847719 systemd-networkd[1038]: eth0: DHCPv4 address 10.0.0.115/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:58:35.869277 systemd[1]: Finished lvm2-activation-early.service. Jul 2 00:58:35.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.870037 systemd[1]: Reached target cryptsetup.target. Jul 2 00:58:35.871545 systemd[1]: Starting lvm2-activation.service... Jul 2 00:58:35.874715 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:58:35.896276 systemd[1]: Finished lvm2-activation.service. Jul 2 00:58:35.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.896993 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:58:35.897607 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 00:58:35.897630 systemd[1]: Reached target local-fs.target. Jul 2 00:58:35.898173 systemd[1]: Reached target machines.target. Jul 2 00:58:35.899678 systemd[1]: Starting ldconfig.service... Jul 2 00:58:35.900504 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:58:35.900556 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:35.901532 systemd[1]: Starting systemd-boot-update.service... Jul 2 00:58:35.903239 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 00:58:35.905187 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 00:58:35.906978 systemd[1]: Starting systemd-sysext.service... Jul 2 00:58:35.910666 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) Jul 2 00:58:35.912035 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 00:58:35.924260 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:58:35.935772 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 00:58:35.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.939305 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:58:35.939520 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:58:35.979639 kernel: loop0: detected capacity change from 0 to 194096 Jul 2 00:58:35.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:35.981282 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 00:58:35.990645 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 00:58:36.004119 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) Jul 2 00:58:36.004119 systemd-fsck[1077]: /dev/vda1: 236 files, 117047/258078 clusters Jul 2 00:58:36.006080 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 00:58:36.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.009707 kernel: loop1: detected capacity change from 0 to 194096 Jul 2 00:58:36.014655 (sd-sysext)[1081]: Using extensions 'kubernetes'. Jul 2 00:58:36.015040 (sd-sysext)[1081]: Merged extensions into '/usr'. Jul 2 00:58:36.032452 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.033640 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:58:36.035490 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:58:36.037212 systemd[1]: Starting modprobe@loop.service... Jul 2 00:58:36.037938 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.038080 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.038821 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:58:36.038953 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:58:36.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.040150 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:58:36.040256 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:58:36.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.041390 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:58:36.041491 systemd[1]: Finished modprobe@loop.service. Jul 2 00:58:36.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.042599 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:58:36.042697 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.081936 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 00:58:36.085662 systemd[1]: Finished ldconfig.service. Jul 2 00:58:36.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.310360 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 00:58:36.311813 systemd[1]: Mounting boot.mount... Jul 2 00:58:36.313387 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:58:36.319185 systemd[1]: Mounted boot.mount. Jul 2 00:58:36.319942 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:58:36.321653 systemd[1]: Finished systemd-sysext.service. Jul 2 00:58:36.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.323378 systemd[1]: Starting ensure-sysext.service... Jul 2 00:58:36.325144 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 00:58:36.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.327863 systemd[1]: Finished systemd-boot-update.service. Jul 2 00:58:36.330065 systemd[1]: Reloading. Jul 2 00:58:36.335514 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 00:58:36.337104 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 00:58:36.340234 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 00:58:36.367905 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2024-07-02T00:58:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:58:36.368245 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2024-07-02T00:58:36Z" level=info msg="torcx already run" Jul 2 00:58:36.417765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:58:36.417785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:58:36.432644 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:58:36.473000 audit: BPF prog-id=24 op=LOAD Jul 2 00:58:36.473000 audit: BPF prog-id=21 op=UNLOAD Jul 2 00:58:36.473000 audit: BPF prog-id=25 op=LOAD Jul 2 00:58:36.474000 audit: BPF prog-id=26 op=LOAD Jul 2 00:58:36.474000 audit: BPF prog-id=22 op=UNLOAD Jul 2 00:58:36.474000 audit: BPF prog-id=23 op=UNLOAD Jul 2 00:58:36.474000 audit: BPF prog-id=27 op=LOAD Jul 2 00:58:36.474000 audit: BPF prog-id=28 op=LOAD Jul 2 00:58:36.474000 audit: BPF prog-id=18 op=UNLOAD Jul 2 00:58:36.474000 audit: BPF prog-id=19 op=UNLOAD Jul 2 00:58:36.476000 audit: BPF prog-id=29 op=LOAD Jul 2 00:58:36.476000 audit: BPF prog-id=15 op=UNLOAD Jul 2 00:58:36.476000 audit: BPF prog-id=30 op=LOAD Jul 2 00:58:36.476000 audit: BPF prog-id=31 op=LOAD Jul 2 00:58:36.476000 audit: BPF prog-id=16 op=UNLOAD Jul 2 00:58:36.476000 audit: BPF prog-id=17 op=UNLOAD Jul 2 00:58:36.477000 audit: BPF prog-id=32 op=LOAD Jul 2 00:58:36.477000 audit: BPF prog-id=20 op=UNLOAD Jul 2 00:58:36.479635 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 00:58:36.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.483731 systemd[1]: Starting audit-rules.service... Jul 2 00:58:36.485418 systemd[1]: Starting clean-ca-certificates.service... Jul 2 00:58:36.488006 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 00:58:36.490000 audit: BPF prog-id=33 op=LOAD Jul 2 00:58:36.492380 systemd[1]: Starting systemd-resolved.service... Jul 2 00:58:36.493000 audit: BPF prog-id=34 op=LOAD Jul 2 00:58:36.494436 systemd[1]: Starting systemd-timesyncd.service... Jul 2 00:58:36.496178 systemd[1]: Starting systemd-update-utmp.service... Jul 2 00:58:36.497470 systemd[1]: Finished clean-ca-certificates.service. Jul 2 00:58:36.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.499000 audit[1159]: SYSTEM_BOOT pid=1159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.500253 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:58:36.503875 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.505128 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:58:36.507026 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:58:36.508759 systemd[1]: Starting modprobe@loop.service... Jul 2 00:58:36.509419 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.509541 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.509661 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:58:36.510502 systemd[1]: Finished systemd-update-utmp.service. Jul 2 00:58:36.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.511624 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:58:36.511746 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:58:36.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.512754 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:58:36.512861 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:58:36.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.514003 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 00:58:36.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.515212 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:58:36.515344 systemd[1]: Finished modprobe@loop.service. Jul 2 00:58:36.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.518234 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.519810 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:58:36.521781 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:58:36.523547 systemd[1]: Starting modprobe@loop.service... Jul 2 00:58:36.524283 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.524415 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.525722 systemd[1]: Starting systemd-update-done.service... Jul 2 00:58:36.526343 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:58:36.527352 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:58:36.527499 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:58:36.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.528554 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:58:36.528702 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:58:36.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.529749 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:58:36.529868 systemd[1]: Finished modprobe@loop.service. Jul 2 00:58:36.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.530823 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:58:36.530919 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.533218 systemd[1]: Finished systemd-update-done.service. Jul 2 00:58:36.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.534323 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.535451 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:58:36.537328 systemd[1]: Starting modprobe@drm.service... Jul 2 00:58:36.539178 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:58:36.541188 systemd[1]: Starting modprobe@loop.service... Jul 2 00:58:36.541892 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.542027 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.543393 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 00:58:36.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.544340 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:58:36.545373 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:58:36.545513 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:58:36.546604 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:58:36.546716 systemd[1]: Finished modprobe@drm.service. Jul 2 00:58:36.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.547676 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:58:36.547787 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:58:36.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.548782 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:58:36.548888 systemd[1]: Finished modprobe@loop.service. Jul 2 00:58:36.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.550012 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:58:36.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:36.550113 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.551850 systemd[1]: Finished ensure-sysext.service. Jul 2 00:58:36.561000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 00:58:36.561000 audit[1181]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc38aa9e0 a2=420 a3=0 items=0 ppid=1148 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:36.561000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 00:58:36.562805 augenrules[1181]: No rules Jul 2 00:58:36.563740 systemd[1]: Finished audit-rules.service. Jul 2 00:58:36.566030 systemd-resolved[1152]: Positive Trust Anchors: Jul 2 00:58:36.566042 systemd-resolved[1152]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:58:36.566068 systemd-resolved[1152]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:58:36.570161 systemd[1]: Started systemd-timesyncd.service. Jul 2 00:58:36.571143 systemd-timesyncd[1156]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 00:58:36.571150 systemd[1]: Reached target time-set.target. Jul 2 00:58:36.571196 systemd-timesyncd[1156]: Initial clock synchronization to Tue 2024-07-02 00:58:36.660096 UTC. Jul 2 00:58:36.586976 systemd-resolved[1152]: Defaulting to hostname 'linux'. Jul 2 00:58:36.588323 systemd[1]: Started systemd-resolved.service. Jul 2 00:58:36.589015 systemd[1]: Reached target network.target. Jul 2 00:58:36.589592 systemd[1]: Reached target nss-lookup.target. Jul 2 00:58:36.590164 systemd[1]: Reached target sysinit.target. Jul 2 00:58:36.590784 systemd[1]: Started motdgen.path. Jul 2 00:58:36.591308 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 00:58:36.592288 systemd[1]: Started logrotate.timer. Jul 2 00:58:36.592970 systemd[1]: Started mdadm.timer. Jul 2 00:58:36.593466 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 00:58:36.594107 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:58:36.594130 systemd[1]: Reached target paths.target. Jul 2 00:58:36.594671 systemd[1]: Reached target timers.target. Jul 2 00:58:36.595474 systemd[1]: Listening on dbus.socket. Jul 2 00:58:36.597053 systemd[1]: Starting docker.socket... Jul 2 00:58:36.600157 systemd[1]: Listening on sshd.socket. Jul 2 00:58:36.600915 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.601484 systemd[1]: Listening on docker.socket. Jul 2 00:58:36.602164 systemd[1]: Reached target sockets.target. Jul 2 00:58:36.602750 systemd[1]: Reached target basic.target. Jul 2 00:58:36.603322 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.603355 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:58:36.604339 systemd[1]: Starting containerd.service... Jul 2 00:58:36.606066 systemd[1]: Starting dbus.service... Jul 2 00:58:36.607668 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:58:36.609455 systemd[1]: Starting extend-filesystems.service... Jul 2 00:58:36.610226 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 00:58:36.611646 systemd[1]: Starting motdgen.service... Jul 2 00:58:36.614342 systemd[1]: Starting prepare-helm.service... Jul 2 00:58:36.618768 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:58:36.620644 systemd[1]: Starting sshd-keygen.service... Jul 2 00:58:36.623594 systemd[1]: Starting systemd-logind.service... Jul 2 00:58:36.624226 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:58:36.624342 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:58:36.624851 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 00:58:36.627488 systemd[1]: Starting update-engine.service... Jul 2 00:58:36.628020 jq[1191]: false Jul 2 00:58:36.629683 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 00:58:36.632327 jq[1206]: true Jul 2 00:58:36.633072 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:58:36.633268 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:58:36.637787 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:58:36.637975 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:58:36.638584 extend-filesystems[1192]: Found loop1 Jul 2 00:58:36.638584 extend-filesystems[1192]: Found vda Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda1 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda2 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda3 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found usr Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda4 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda6 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda7 Jul 2 00:58:36.639806 extend-filesystems[1192]: Found vda9 Jul 2 00:58:36.639806 extend-filesystems[1192]: Checking size of /dev/vda9 Jul 2 00:58:36.652660 tar[1208]: linux-arm64/helm Jul 2 00:58:36.652855 jq[1210]: true Jul 2 00:58:36.656762 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:58:36.656914 systemd[1]: Finished motdgen.service. Jul 2 00:58:36.672182 dbus-daemon[1190]: [system] SELinux support is enabled Jul 2 00:58:36.672352 systemd[1]: Started dbus.service. Jul 2 00:58:36.675116 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 00:58:36.675139 systemd[1]: Reached target system-config.target. Jul 2 00:58:36.676301 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 00:58:36.676322 systemd[1]: Reached target user-config.target. Jul 2 00:58:36.683106 extend-filesystems[1192]: Resized partition /dev/vda9 Jul 2 00:58:36.688599 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 00:58:36.701600 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 2 00:58:36.716064 update_engine[1202]: I0702 00:58:36.715643 1202 main.cc:92] Flatcar Update Engine starting Jul 2 00:58:36.722171 systemd[1]: Started update-engine.service. Jul 2 00:58:36.722524 update_engine[1202]: I0702 00:58:36.722496 1202 update_check_scheduler.cc:74] Next update check in 10m58s Jul 2 00:58:36.724286 systemd[1]: Started locksmithd.service. Jul 2 00:58:36.726033 systemd-logind[1201]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 00:58:36.730597 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 2 00:58:36.732941 systemd-logind[1201]: New seat seat0. Jul 2 00:58:36.739335 systemd[1]: Started systemd-logind.service. Jul 2 00:58:36.744282 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 00:58:36.744282 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 00:58:36.744282 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 2 00:58:36.747192 extend-filesystems[1192]: Resized filesystem in /dev/vda9 Jul 2 00:58:36.746999 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:58:36.748701 bash[1240]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:58:36.747166 systemd[1]: Finished extend-filesystems.service. Jul 2 00:58:36.748844 env[1212]: time="2024-07-02T00:58:36.748724600Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 00:58:36.748173 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 00:58:36.774902 env[1212]: time="2024-07-02T00:58:36.774861880Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:58:36.775024 env[1212]: time="2024-07-02T00:58:36.775002120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776296 env[1212]: time="2024-07-02T00:58:36.776261640Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776329 env[1212]: time="2024-07-02T00:58:36.776297720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776506 env[1212]: time="2024-07-02T00:58:36.776481800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776544 env[1212]: time="2024-07-02T00:58:36.776505920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776544 env[1212]: time="2024-07-02T00:58:36.776519480Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:58:36.776544 env[1212]: time="2024-07-02T00:58:36.776529040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776651 env[1212]: time="2024-07-02T00:58:36.776631040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.776977 env[1212]: time="2024-07-02T00:58:36.776956440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:58:36.777099 env[1212]: time="2024-07-02T00:58:36.777078960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:58:36.777129 env[1212]: time="2024-07-02T00:58:36.777099120Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:58:36.777169 env[1212]: time="2024-07-02T00:58:36.777151640Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:58:36.777208 env[1212]: time="2024-07-02T00:58:36.777169400Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:58:36.781671 env[1212]: time="2024-07-02T00:58:36.781643200Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:58:36.781708 env[1212]: time="2024-07-02T00:58:36.781675800Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:58:36.781708 env[1212]: time="2024-07-02T00:58:36.781689160Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:58:36.781758 env[1212]: time="2024-07-02T00:58:36.781718400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.781758 env[1212]: time="2024-07-02T00:58:36.781732960Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.781758 env[1212]: time="2024-07-02T00:58:36.781751280Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.781817 env[1212]: time="2024-07-02T00:58:36.781764200Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782107 env[1212]: time="2024-07-02T00:58:36.782084360Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782140 env[1212]: time="2024-07-02T00:58:36.782111400Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782140 env[1212]: time="2024-07-02T00:58:36.782125920Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782178 env[1212]: time="2024-07-02T00:58:36.782139320Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782178 env[1212]: time="2024-07-02T00:58:36.782152320Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:58:36.782275 env[1212]: time="2024-07-02T00:58:36.782255040Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:58:36.782349 env[1212]: time="2024-07-02T00:58:36.782332480Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:58:36.782548 env[1212]: time="2024-07-02T00:58:36.782531120Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:58:36.782596 env[1212]: time="2024-07-02T00:58:36.782559040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782596 env[1212]: time="2024-07-02T00:58:36.782590040Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:58:36.782714 env[1212]: time="2024-07-02T00:58:36.782698560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782740 env[1212]: time="2024-07-02T00:58:36.782714480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782740 env[1212]: time="2024-07-02T00:58:36.782726360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782740 env[1212]: time="2024-07-02T00:58:36.782738120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782802 env[1212]: time="2024-07-02T00:58:36.782749440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782802 env[1212]: time="2024-07-02T00:58:36.782761240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782802 env[1212]: time="2024-07-02T00:58:36.782781800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782802 env[1212]: time="2024-07-02T00:58:36.782792960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782877 env[1212]: time="2024-07-02T00:58:36.782806200Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:58:36.782945 env[1212]: time="2024-07-02T00:58:36.782918200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782975 env[1212]: time="2024-07-02T00:58:36.782951320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.782975 env[1212]: time="2024-07-02T00:58:36.782964240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.783013 env[1212]: time="2024-07-02T00:58:36.782975600Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:58:36.783013 env[1212]: time="2024-07-02T00:58:36.782988560Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:58:36.783013 env[1212]: time="2024-07-02T00:58:36.782998400Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:58:36.783076 env[1212]: time="2024-07-02T00:58:36.783015120Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:58:36.783076 env[1212]: time="2024-07-02T00:58:36.783046960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:58:36.783274 env[1212]: time="2024-07-02T00:58:36.783226600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.783281240Z" level=info msg="Connect containerd service" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.783311600Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.784012760Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.784332640Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.784366920Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.785290320Z" level=info msg="containerd successfully booted in 0.048957s" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.785408360Z" level=info msg="Start subscribing containerd event" Jul 2 00:58:36.785515 env[1212]: time="2024-07-02T00:58:36.785459400Z" level=info msg="Start recovering state" Jul 2 00:58:36.784469 systemd[1]: Started containerd.service. Jul 2 00:58:36.785753 env[1212]: time="2024-07-02T00:58:36.785545000Z" level=info msg="Start event monitor" Jul 2 00:58:36.785753 env[1212]: time="2024-07-02T00:58:36.785568960Z" level=info msg="Start snapshots syncer" Jul 2 00:58:36.785753 env[1212]: time="2024-07-02T00:58:36.785610960Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:58:36.785753 env[1212]: time="2024-07-02T00:58:36.785620960Z" level=info msg="Start streaming server" Jul 2 00:58:36.799543 locksmithd[1243]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 00:58:37.079568 tar[1208]: linux-arm64/LICENSE Jul 2 00:58:37.079663 tar[1208]: linux-arm64/README.md Jul 2 00:58:37.083694 systemd[1]: Finished prepare-helm.service. Jul 2 00:58:37.490122 systemd-networkd[1038]: eth0: Gained IPv6LL Jul 2 00:58:37.491729 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 00:58:37.492859 systemd[1]: Reached target network-online.target. Jul 2 00:58:37.494972 systemd[1]: Starting kubelet.service... Jul 2 00:58:37.954123 sshd_keygen[1209]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 00:58:37.971141 systemd[1]: Finished sshd-keygen.service. Jul 2 00:58:37.973219 systemd[1]: Starting issuegen.service... Jul 2 00:58:37.978110 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:58:37.978263 systemd[1]: Finished issuegen.service. Jul 2 00:58:37.980215 systemd[1]: Starting systemd-user-sessions.service... Jul 2 00:58:37.986365 systemd[1]: Finished systemd-user-sessions.service. Jul 2 00:58:37.988358 systemd[1]: Started getty@tty1.service. Jul 2 00:58:37.990205 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 00:58:37.991062 systemd[1]: Reached target getty.target. Jul 2 00:58:38.044980 systemd[1]: Started kubelet.service. Jul 2 00:58:38.046014 systemd[1]: Reached target multi-user.target. Jul 2 00:58:38.047898 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:58:38.054312 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:58:38.054482 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:58:38.055389 systemd[1]: Startup finished in 558ms (kernel) + 3.819s (initrd) + 4.667s (userspace) = 9.045s. Jul 2 00:58:38.622842 kubelet[1271]: E0702 00:58:38.622775 1271 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:58:38.624566 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:58:38.624709 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:58:42.464230 systemd[1]: Created slice system-sshd.slice. Jul 2 00:58:42.465324 systemd[1]: Started sshd@0-10.0.0.115:22-10.0.0.1:60682.service. Jul 2 00:58:42.536737 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 60682 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:42.538985 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:42.552527 systemd[1]: Created slice user-500.slice. Jul 2 00:58:42.553538 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 00:58:42.559734 systemd-logind[1201]: New session 1 of user core. Jul 2 00:58:42.565407 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 00:58:42.566742 systemd[1]: Starting user@500.service... Jul 2 00:58:42.570489 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:42.634998 systemd[1284]: Queued start job for default target default.target. Jul 2 00:58:42.635432 systemd[1284]: Reached target paths.target. Jul 2 00:58:42.635447 systemd[1284]: Reached target sockets.target. Jul 2 00:58:42.635458 systemd[1284]: Reached target timers.target. Jul 2 00:58:42.635468 systemd[1284]: Reached target basic.target. Jul 2 00:58:42.635517 systemd[1284]: Reached target default.target. Jul 2 00:58:42.635551 systemd[1284]: Startup finished in 58ms. Jul 2 00:58:42.635628 systemd[1]: Started user@500.service. Jul 2 00:58:42.636512 systemd[1]: Started session-1.scope. Jul 2 00:58:42.688425 systemd[1]: Started sshd@1-10.0.0.115:22-10.0.0.1:60688.service. Jul 2 00:58:42.730633 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 60688 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:42.732262 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:42.737707 systemd-logind[1201]: New session 2 of user core. Jul 2 00:58:42.738923 systemd[1]: Started session-2.scope. Jul 2 00:58:42.791956 sshd[1293]: pam_unix(sshd:session): session closed for user core Jul 2 00:58:42.794459 systemd[1]: sshd@1-10.0.0.115:22-10.0.0.1:60688.service: Deactivated successfully. Jul 2 00:58:42.795158 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 00:58:42.795640 systemd-logind[1201]: Session 2 logged out. Waiting for processes to exit. Jul 2 00:58:42.796658 systemd[1]: Started sshd@2-10.0.0.115:22-10.0.0.1:60700.service. Jul 2 00:58:42.797313 systemd-logind[1201]: Removed session 2. Jul 2 00:58:42.837544 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 60700 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:42.838918 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:42.842569 systemd-logind[1201]: New session 3 of user core. Jul 2 00:58:42.843457 systemd[1]: Started session-3.scope. Jul 2 00:58:42.893851 sshd[1299]: pam_unix(sshd:session): session closed for user core Jul 2 00:58:42.896411 systemd[1]: sshd@2-10.0.0.115:22-10.0.0.1:60700.service: Deactivated successfully. Jul 2 00:58:42.896960 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 00:58:42.897488 systemd-logind[1201]: Session 3 logged out. Waiting for processes to exit. Jul 2 00:58:42.898491 systemd[1]: Started sshd@3-10.0.0.115:22-10.0.0.1:60708.service. Jul 2 00:58:42.899184 systemd-logind[1201]: Removed session 3. Jul 2 00:58:42.939149 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 60708 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:42.940276 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:42.944346 systemd[1]: Started session-4.scope. Jul 2 00:58:42.944625 systemd-logind[1201]: New session 4 of user core. Jul 2 00:58:42.998044 sshd[1305]: pam_unix(sshd:session): session closed for user core Jul 2 00:58:43.000668 systemd[1]: sshd@3-10.0.0.115:22-10.0.0.1:60708.service: Deactivated successfully. Jul 2 00:58:43.001318 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 00:58:43.001865 systemd-logind[1201]: Session 4 logged out. Waiting for processes to exit. Jul 2 00:58:43.002848 systemd[1]: Started sshd@4-10.0.0.115:22-10.0.0.1:60722.service. Jul 2 00:58:43.003514 systemd-logind[1201]: Removed session 4. Jul 2 00:58:43.042131 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 60722 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:43.043222 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:43.046167 systemd-logind[1201]: New session 5 of user core. Jul 2 00:58:43.046946 systemd[1]: Started session-5.scope. Jul 2 00:58:43.109278 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 00:58:43.109488 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:58:43.124754 dbus-daemon[1190]: avc: received setenforce notice (enforcing=1) Jul 2 00:58:43.125670 sudo[1315]: pam_unix(sudo:session): session closed for user root Jul 2 00:58:43.127556 sshd[1311]: pam_unix(sshd:session): session closed for user core Jul 2 00:58:43.131235 systemd[1]: Started sshd@5-10.0.0.115:22-10.0.0.1:60730.service. Jul 2 00:58:43.131818 systemd[1]: sshd@4-10.0.0.115:22-10.0.0.1:60722.service: Deactivated successfully. Jul 2 00:58:43.132534 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 00:58:43.133066 systemd-logind[1201]: Session 5 logged out. Waiting for processes to exit. Jul 2 00:58:43.133816 systemd-logind[1201]: Removed session 5. Jul 2 00:58:43.170593 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 60730 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:43.171695 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:43.174534 systemd-logind[1201]: New session 6 of user core. Jul 2 00:58:43.175274 systemd[1]: Started session-6.scope. Jul 2 00:58:43.226954 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 00:58:43.227172 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:58:43.229549 sudo[1323]: pam_unix(sudo:session): session closed for user root Jul 2 00:58:43.233723 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 00:58:43.233949 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:58:43.242046 systemd[1]: Stopping audit-rules.service... Jul 2 00:58:43.241000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:58:43.243244 auditctl[1326]: No rules Jul 2 00:58:43.243494 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 00:58:43.243644 kernel: kauditd_printk_skb: 113 callbacks suppressed Jul 2 00:58:43.243671 kernel: audit: type=1305 audit(1719881923.241:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:58:43.243685 systemd[1]: Stopped audit-rules.service. Jul 2 00:58:43.241000 audit[1326]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0102bd0 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.245083 systemd[1]: Starting audit-rules.service... Jul 2 00:58:43.247389 kernel: audit: type=1300 audit(1719881923.241:203): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0102bd0 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.247431 kernel: audit: type=1327 audit(1719881923.241:203): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:58:43.241000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:58:43.248482 kernel: audit: type=1131 audit(1719881923.242:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.260326 augenrules[1343]: No rules Jul 2 00:58:43.260920 systemd[1]: Finished audit-rules.service. Jul 2 00:58:43.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.263222 sudo[1322]: pam_unix(sudo:session): session closed for user root Jul 2 00:58:43.263598 kernel: audit: type=1130 audit(1719881923.259:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.263647 kernel: audit: type=1106 audit(1719881923.261:206): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.261000 audit[1322]: USER_END pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.261000 audit[1322]: CRED_DISP pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.266509 sshd[1318]: pam_unix(sshd:session): session closed for user core Jul 2 00:58:43.268546 kernel: audit: type=1104 audit(1719881923.261:207): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.268619 kernel: audit: type=1106 audit(1719881923.266:208): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.266000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.269848 systemd[1]: Started sshd@6-10.0.0.115:22-10.0.0.1:60742.service. Jul 2 00:58:43.270368 systemd[1]: sshd@5-10.0.0.115:22-10.0.0.1:60730.service: Deactivated successfully. Jul 2 00:58:43.266000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.271071 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 00:58:43.271595 systemd-logind[1201]: Session 6 logged out. Waiting for processes to exit. Jul 2 00:58:43.272435 systemd-logind[1201]: Removed session 6. Jul 2 00:58:43.272795 kernel: audit: type=1104 audit(1719881923.266:209): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.274778 kernel: audit: type=1130 audit(1719881923.269:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.115:22-10.0.0.1:60730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.308000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.309224 sshd[1348]: Accepted publickey for core from 10.0.0.1 port 60742 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:58:43.309000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.309000 audit[1348]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd2b1300 a2=3 a3=1 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:58:43.310213 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:58:43.313459 systemd-logind[1201]: New session 7 of user core. Jul 2 00:58:43.313917 systemd[1]: Started session-7.scope. Jul 2 00:58:43.316000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.318000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:58:43.364000 audit[1352]: USER_ACCT pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.365111 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 00:58:43.364000 audit[1352]: CRED_REFR pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.365555 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:58:43.366000 audit[1352]: USER_START pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.428316 systemd[1]: Starting docker.service... Jul 2 00:58:43.514530 env[1364]: time="2024-07-02T00:58:43.514417719Z" level=info msg="Starting up" Jul 2 00:58:43.516277 env[1364]: time="2024-07-02T00:58:43.516252437Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:58:43.516277 env[1364]: time="2024-07-02T00:58:43.516272135Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:58:43.516378 env[1364]: time="2024-07-02T00:58:43.516291150Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:58:43.516378 env[1364]: time="2024-07-02T00:58:43.516301119Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:58:43.518282 env[1364]: time="2024-07-02T00:58:43.518254065Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:58:43.518370 env[1364]: time="2024-07-02T00:58:43.518355891Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:58:43.518429 env[1364]: time="2024-07-02T00:58:43.518413457Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:58:43.518478 env[1364]: time="2024-07-02T00:58:43.518465315Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:58:43.624353 env[1364]: time="2024-07-02T00:58:43.624289931Z" level=info msg="Loading containers: start." Jul 2 00:58:43.673000 audit[1398]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.673000 audit[1398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffedff5be0 a2=0 a3=1 items=0 ppid=1364 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 00:58:43.675000 audit[1400]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.675000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd8ae1840 a2=0 a3=1 items=0 ppid=1364 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 00:58:43.676000 audit[1402]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.676000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc5d7be10 a2=0 a3=1 items=0 ppid=1364 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:58:43.678000 audit[1404]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.678000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc86327a0 a2=0 a3=1 items=0 ppid=1364 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:58:43.682000 audit[1406]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.682000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0122320 a2=0 a3=1 items=0 ppid=1364 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 00:58:43.702000 audit[1411]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.702000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe20f1820 a2=0 a3=1 items=0 ppid=1364 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 00:58:43.709000 audit[1413]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.709000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffec5d3d0 a2=0 a3=1 items=0 ppid=1364 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 00:58:43.710000 audit[1415]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.710000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe86271e0 a2=0 a3=1 items=0 ppid=1364 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.710000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 00:58:43.712000 audit[1417]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.712000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe38697c0 a2=0 a3=1 items=0 ppid=1364 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:58:43.718000 audit[1421]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.718000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd3cbe890 a2=0 a3=1 items=0 ppid=1364 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.718000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:58:43.719000 audit[1422]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.719000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffced6c520 a2=0 a3=1 items=0 ppid=1364 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:58:43.728601 kernel: Initializing XFRM netlink socket Jul 2 00:58:43.750449 env[1364]: time="2024-07-02T00:58:43.750412787Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 00:58:43.768000 audit[1430]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.768000 audit[1430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffcead87c0 a2=0 a3=1 items=0 ppid=1364 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:58:43.786000 audit[1433]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.786000 audit[1433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc37c8380 a2=0 a3=1 items=0 ppid=1364 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:58:43.788000 audit[1436]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.788000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe0dccd20 a2=0 a3=1 items=0 ppid=1364 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:58:43.790000 audit[1438]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.790000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff4e0c950 a2=0 a3=1 items=0 ppid=1364 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:58:43.792000 audit[1440]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.792000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe1dc66e0 a2=0 a3=1 items=0 ppid=1364 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:58:43.793000 audit[1442]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.793000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd584a980 a2=0 a3=1 items=0 ppid=1364 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 00:58:43.795000 audit[1444]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.795000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff6eaca00 a2=0 a3=1 items=0 ppid=1364 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.795000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:58:43.803000 audit[1447]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.803000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe0d588c0 a2=0 a3=1 items=0 ppid=1364 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:58:43.805000 audit[1449]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.805000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe05ba980 a2=0 a3=1 items=0 ppid=1364 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:58:43.807000 audit[1451]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.807000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe8b893f0 a2=0 a3=1 items=0 ppid=1364 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:58:43.808000 audit[1453]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.808000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffde1a2aa0 a2=0 a3=1 items=0 ppid=1364 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.808000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:58:43.810597 systemd-networkd[1038]: docker0: Link UP Jul 2 00:58:43.816000 audit[1457]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.816000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd70edca0 a2=0 a3=1 items=0 ppid=1364 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:58:43.817000 audit[1458]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:58:43.817000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffda83f050 a2=0 a3=1 items=0 ppid=1364 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:58:43.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:58:43.819079 env[1364]: time="2024-07-02T00:58:43.819053001Z" level=info msg="Loading containers: done." Jul 2 00:58:43.838150 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck656984742-merged.mount: Deactivated successfully. Jul 2 00:58:43.845562 env[1364]: time="2024-07-02T00:58:43.845511818Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 00:58:43.845705 env[1364]: time="2024-07-02T00:58:43.845684034Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 00:58:43.845799 env[1364]: time="2024-07-02T00:58:43.845771468Z" level=info msg="Daemon has completed initialization" Jul 2 00:58:43.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:43.862146 systemd[1]: Started docker.service. Jul 2 00:58:43.866667 env[1364]: time="2024-07-02T00:58:43.866539362Z" level=info msg="API listen on /run/docker.sock" Jul 2 00:58:44.354735 env[1212]: time="2024-07-02T00:58:44.354684014Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 00:58:44.940792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3813975164.mount: Deactivated successfully. Jul 2 00:58:46.214569 env[1212]: time="2024-07-02T00:58:46.214515687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:46.215956 env[1212]: time="2024-07-02T00:58:46.215906926Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84c601f3f72c87776cdcf77a73329d1f45297e43a92508b0f289fa2fcf8872a0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:46.218498 env[1212]: time="2024-07-02T00:58:46.218462409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:46.220122 env[1212]: time="2024-07-02T00:58:46.220093127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:46.220930 env[1212]: time="2024-07-02T00:58:46.220904473Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:84c601f3f72c87776cdcf77a73329d1f45297e43a92508b0f289fa2fcf8872a0\"" Jul 2 00:58:46.233051 env[1212]: time="2024-07-02T00:58:46.233010927Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 00:58:47.837281 env[1212]: time="2024-07-02T00:58:47.837238116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:47.838675 env[1212]: time="2024-07-02T00:58:47.838647471Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e1dcc3400d3ea6a268c7ea6e66c3a196703770a8e346b695f54344ab53a47567,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:47.841149 env[1212]: time="2024-07-02T00:58:47.841114232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:47.842931 env[1212]: time="2024-07-02T00:58:47.842889775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:47.843626 env[1212]: time="2024-07-02T00:58:47.843591142Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e1dcc3400d3ea6a268c7ea6e66c3a196703770a8e346b695f54344ab53a47567\"" Jul 2 00:58:47.852172 env[1212]: time="2024-07-02T00:58:47.852135004Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 00:58:48.875435 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 00:58:48.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:48.875637 systemd[1]: Stopped kubelet.service. Jul 2 00:58:48.876998 systemd[1]: Starting kubelet.service... Jul 2 00:58:48.877916 kernel: kauditd_printk_skb: 84 callbacks suppressed Jul 2 00:58:48.877978 kernel: audit: type=1130 audit(1719881928.875:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:48.878006 kernel: audit: type=1131 audit(1719881928.875:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:48.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:48.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:48.970859 systemd[1]: Started kubelet.service. Jul 2 00:58:48.973625 kernel: audit: type=1130 audit(1719881928.970:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:49.024324 env[1212]: time="2024-07-02T00:58:49.024267987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:49.026451 env[1212]: time="2024-07-02T00:58:49.026410219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7dd04b1bafeb51c650fde7f34ac0fdafa96030e77ea7a822135ff302d895dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:49.028731 env[1212]: time="2024-07-02T00:58:49.028692243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:49.030280 env[1212]: time="2024-07-02T00:58:49.030250327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:49.031162 env[1212]: time="2024-07-02T00:58:49.031125645Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:c7dd04b1bafeb51c650fde7f34ac0fdafa96030e77ea7a822135ff302d895dd5\"" Jul 2 00:58:49.037349 kubelet[1520]: E0702 00:58:49.037312 1520 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:58:49.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:58:49.041157 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:58:49.041280 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:58:49.043624 kernel: audit: type=1131 audit(1719881929.039:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:58:49.043980 env[1212]: time="2024-07-02T00:58:49.043941830Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 00:58:50.020366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1055846855.mount: Deactivated successfully. Jul 2 00:58:51.618777 env[1212]: time="2024-07-02T00:58:51.618410519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:51.619643 env[1212]: time="2024-07-02T00:58:51.619618348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:51.620903 env[1212]: time="2024-07-02T00:58:51.620872096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:51.622098 env[1212]: time="2024-07-02T00:58:51.622051878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:51.622488 env[1212]: time="2024-07-02T00:58:51.622453366Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae\"" Jul 2 00:58:51.631842 env[1212]: time="2024-07-02T00:58:51.631788559Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 00:58:52.162860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4290491806.mount: Deactivated successfully. Jul 2 00:58:52.872244 env[1212]: time="2024-07-02T00:58:52.872200552Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:52.873586 env[1212]: time="2024-07-02T00:58:52.873541603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:52.875166 env[1212]: time="2024-07-02T00:58:52.875138317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:52.877753 env[1212]: time="2024-07-02T00:58:52.877721470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:52.878321 env[1212]: time="2024-07-02T00:58:52.878263162Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Jul 2 00:58:52.888198 env[1212]: time="2024-07-02T00:58:52.888172301Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 00:58:53.283741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3645081621.mount: Deactivated successfully. Jul 2 00:58:53.287004 env[1212]: time="2024-07-02T00:58:53.286964794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:53.288358 env[1212]: time="2024-07-02T00:58:53.288327783Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:53.289608 env[1212]: time="2024-07-02T00:58:53.289566568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:53.290910 env[1212]: time="2024-07-02T00:58:53.290877889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:53.291464 env[1212]: time="2024-07-02T00:58:53.291429373Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Jul 2 00:58:53.300119 env[1212]: time="2024-07-02T00:58:53.300083689Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 00:58:53.759491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2476535090.mount: Deactivated successfully. Jul 2 00:58:56.749406 env[1212]: time="2024-07-02T00:58:56.749350762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:56.751276 env[1212]: time="2024-07-02T00:58:56.751239103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:56.753661 env[1212]: time="2024-07-02T00:58:56.753621999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:56.755382 env[1212]: time="2024-07-02T00:58:56.755348077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:58:56.757119 env[1212]: time="2024-07-02T00:58:56.757073034Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" Jul 2 00:58:59.247981 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 00:58:59.248147 systemd[1]: Stopped kubelet.service. Jul 2 00:58:59.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.249486 systemd[1]: Starting kubelet.service... Jul 2 00:58:59.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.252189 kernel: audit: type=1130 audit(1719881939.246:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.252272 kernel: audit: type=1131 audit(1719881939.246:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.344870 systemd[1]: Started kubelet.service. Jul 2 00:58:59.347613 kernel: audit: type=1130 audit(1719881939.344:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:58:59.386138 kubelet[1630]: E0702 00:58:59.386098 1630 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:58:59.388434 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:58:59.388560 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:58:59.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:58:59.390593 kernel: audit: type=1131 audit(1719881939.388:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:59:01.087776 systemd[1]: Stopped kubelet.service. Jul 2 00:59:01.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.093849 kernel: audit: type=1130 audit(1719881941.086:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.093913 kernel: audit: type=1131 audit(1719881941.087:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.094125 systemd[1]: Starting kubelet.service... Jul 2 00:59:01.113957 systemd[1]: Reloading. Jul 2 00:59:01.181694 /usr/lib/systemd/system-generators/torcx-generator[1665]: time="2024-07-02T00:59:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:59:01.181723 /usr/lib/systemd/system-generators/torcx-generator[1665]: time="2024-07-02T00:59:01Z" level=info msg="torcx already run" Jul 2 00:59:01.337669 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:59:01.337846 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:59:01.353173 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405226 kernel: audit: type=1400 audit(1719881941.401:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405289 kernel: audit: type=1400 audit(1719881941.401:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405308 kernel: audit: type=1400 audit(1719881941.401:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406875 kernel: audit: type=1400 audit(1719881941.401:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit: BPF prog-id=40 op=LOAD Jul 2 00:59:01.403000 audit: BPF prog-id=34 op=UNLOAD Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.404000 audit: BPF prog-id=41 op=LOAD Jul 2 00:59:01.404000 audit: BPF prog-id=38 op=UNLOAD Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit: BPF prog-id=42 op=LOAD Jul 2 00:59:01.406000 audit: BPF prog-id=24 op=UNLOAD Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit: BPF prog-id=43 op=LOAD Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.411000 audit: BPF prog-id=44 op=LOAD Jul 2 00:59:01.411000 audit: BPF prog-id=25 op=UNLOAD Jul 2 00:59:01.411000 audit: BPF prog-id=26 op=UNLOAD Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.412000 audit: BPF prog-id=45 op=LOAD Jul 2 00:59:01.412000 audit: BPF prog-id=35 op=UNLOAD Jul 2 00:59:01.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit: BPF prog-id=46 op=LOAD Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.413000 audit: BPF prog-id=47 op=LOAD Jul 2 00:59:01.413000 audit: BPF prog-id=36 op=UNLOAD Jul 2 00:59:01.413000 audit: BPF prog-id=37 op=UNLOAD Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit: BPF prog-id=48 op=LOAD Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.417000 audit: BPF prog-id=49 op=LOAD Jul 2 00:59:01.417000 audit: BPF prog-id=27 op=UNLOAD Jul 2 00:59:01.417000 audit: BPF prog-id=28 op=UNLOAD Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit: BPF prog-id=50 op=LOAD Jul 2 00:59:01.420000 audit: BPF prog-id=33 op=UNLOAD Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.420000 audit: BPF prog-id=51 op=LOAD Jul 2 00:59:01.421000 audit: BPF prog-id=29 op=UNLOAD Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit: BPF prog-id=52 op=LOAD Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit: BPF prog-id=53 op=LOAD Jul 2 00:59:01.421000 audit: BPF prog-id=30 op=UNLOAD Jul 2 00:59:01.421000 audit: BPF prog-id=31 op=UNLOAD Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:01.421000 audit: BPF prog-id=54 op=LOAD Jul 2 00:59:01.421000 audit: BPF prog-id=32 op=UNLOAD Jul 2 00:59:01.431657 systemd[1]: Started kubelet.service. Jul 2 00:59:01.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.433264 systemd[1]: Stopping kubelet.service... Jul 2 00:59:01.433487 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:59:01.433735 systemd[1]: Stopped kubelet.service. Jul 2 00:59:01.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.435935 systemd[1]: Starting kubelet.service... Jul 2 00:59:01.519166 systemd[1]: Started kubelet.service. Jul 2 00:59:01.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:01.559584 kubelet[1708]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:59:01.559584 kubelet[1708]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:59:01.559584 kubelet[1708]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:59:01.559897 kubelet[1708]: I0702 00:59:01.559711 1708 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:59:02.041470 kubelet[1708]: I0702 00:59:02.041430 1708 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 00:59:02.041470 kubelet[1708]: I0702 00:59:02.041457 1708 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:59:02.041677 kubelet[1708]: I0702 00:59:02.041664 1708 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 00:59:02.069830 kubelet[1708]: E0702 00:59:02.069804 1708 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.115:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.070042 kubelet[1708]: I0702 00:59:02.070028 1708 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:59:02.077883 kubelet[1708]: I0702 00:59:02.077862 1708 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:59:02.078345 kubelet[1708]: I0702 00:59:02.078305 1708 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:59:02.078500 kubelet[1708]: I0702 00:59:02.078334 1708 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:59:02.078600 kubelet[1708]: I0702 00:59:02.078566 1708 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:59:02.078600 kubelet[1708]: I0702 00:59:02.078591 1708 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:59:02.078783 kubelet[1708]: I0702 00:59:02.078759 1708 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:59:02.080288 kubelet[1708]: I0702 00:59:02.080258 1708 kubelet.go:400] "Attempting to sync node with API server" Jul 2 00:59:02.080288 kubelet[1708]: I0702 00:59:02.080288 1708 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:59:02.080565 kubelet[1708]: I0702 00:59:02.080550 1708 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:59:02.080660 kubelet[1708]: I0702 00:59:02.080643 1708 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:59:02.081661 kubelet[1708]: W0702 00:59:02.081568 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.081661 kubelet[1708]: E0702 00:59:02.081647 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.081903 kubelet[1708]: I0702 00:59:02.081875 1708 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:59:02.083532 kubelet[1708]: I0702 00:59:02.083506 1708 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:59:02.083723 kubelet[1708]: W0702 00:59:02.083693 1708 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 00:59:02.084511 kubelet[1708]: I0702 00:59:02.084477 1708 server.go:1264] "Started kubelet" Jul 2 00:59:02.085214 kubelet[1708]: I0702 00:59:02.085162 1708 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:59:02.085263 kubelet[1708]: I0702 00:59:02.085219 1708 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:59:02.085604 kubelet[1708]: I0702 00:59:02.085563 1708 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:59:02.085646 kubelet[1708]: W0702 00:59:02.084455 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.085646 kubelet[1708]: E0702 00:59:02.085643 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.090952 kubelet[1708]: I0702 00:59:02.090922 1708 server.go:455] "Adding debug handlers to kubelet server" Jul 2 00:59:02.091000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:02.091000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:02.091000 audit[1708]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000651dd0 a1=4000649680 a2=4000651da0 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:02.091000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:02.091000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:02.091000 audit[1708]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e12540 a1=4000649698 a2=4000651e60 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:02.092169 kubelet[1708]: I0702 00:59:02.091879 1708 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:59:02.092169 kubelet[1708]: I0702 00:59:02.092073 1708 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:59:02.092169 kubelet[1708]: I0702 00:59:02.092138 1708 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:59:02.095000 audit[1720]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.095000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc2354480 a2=0 a3=1 items=0 ppid=1708 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:59:02.096533 kubelet[1708]: I0702 00:59:02.094179 1708 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:59:02.096533 kubelet[1708]: I0702 00:59:02.094669 1708 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 00:59:02.096533 kubelet[1708]: I0702 00:59:02.095098 1708 reconciler.go:26] "Reconciler: start to sync state" Jul 2 00:59:02.096533 kubelet[1708]: E0702 00:59:02.095303 1708 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="200ms" Jul 2 00:59:02.097000 audit[1721]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.097000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcfe34a50 a2=0 a3=1 items=0 ppid=1708 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:59:02.098959 kubelet[1708]: E0702 00:59:02.098790 1708 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.115:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.115:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17de3f83958d7e20 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-07-02 00:59:02.084451872 +0000 UTC m=+0.560855862,LastTimestamp:2024-07-02 00:59:02.084451872 +0000 UTC m=+0.560855862,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Jul 2 00:59:02.099329 kubelet[1708]: W0702 00:59:02.099277 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.099387 kubelet[1708]: E0702 00:59:02.099339 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.100000 audit[1724]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.100000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd30b77c0 a2=0 a3=1 items=0 ppid=1708 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:59:02.102527 kubelet[1708]: I0702 00:59:02.102263 1708 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:59:02.102527 kubelet[1708]: I0702 00:59:02.102280 1708 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:59:02.102527 kubelet[1708]: I0702 00:59:02.102370 1708 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:59:02.104000 audit[1726]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.104000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc6dd0c70 a2=0 a3=1 items=0 ppid=1708 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:59:02.116441 kubelet[1708]: I0702 00:59:02.116279 1708 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:59:02.115000 audit[1732]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.115000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff37119d0 a2=0 a3=1 items=0 ppid=1708 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 00:59:02.116908 kubelet[1708]: I0702 00:59:02.116890 1708 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:59:02.117057 kubelet[1708]: I0702 00:59:02.117045 1708 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:59:02.117425 kubelet[1708]: I0702 00:59:02.116669 1708 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:59:02.117000 audit[1735]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:02.117000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcfdf1490 a2=0 a3=1 items=0 ppid=1708 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:59:02.117000 audit[1734]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.117000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff597e780 a2=0 a3=1 items=0 ppid=1708 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:59:02.118861 kubelet[1708]: I0702 00:59:02.118223 1708 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:59:02.119425 kubelet[1708]: I0702 00:59:02.119307 1708 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:59:02.119425 kubelet[1708]: I0702 00:59:02.119333 1708 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 00:59:02.119425 kubelet[1708]: E0702 00:59:02.119368 1708 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:59:02.119000 audit[1736]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:02.119000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6068450 a2=0 a3=1 items=0 ppid=1708 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:59:02.120132 kubelet[1708]: W0702 00:59:02.120048 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.120132 kubelet[1708]: E0702 00:59:02.120089 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:02.120400 kubelet[1708]: I0702 00:59:02.120187 1708 policy_none.go:49] "None policy: Start" Jul 2 00:59:02.121014 kubelet[1708]: I0702 00:59:02.120992 1708 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:59:02.121014 kubelet[1708]: I0702 00:59:02.121017 1708 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:59:02.120000 audit[1737]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.120000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1050e30 a2=0 a3=1 items=0 ppid=1708 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:59:02.120000 audit[1740]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:02.120000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe0c99ed0 a2=0 a3=1 items=0 ppid=1708 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:59:02.122000 audit[1741]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:02.122000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff98b2a00 a2=0 a3=1 items=0 ppid=1708 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:59:02.122000 audit[1742]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:02.122000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffec9b860 a2=0 a3=1 items=0 ppid=1708 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:59:02.126342 systemd[1]: Created slice kubepods.slice. Jul 2 00:59:02.130696 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 00:59:02.134401 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 00:59:02.145382 kubelet[1708]: I0702 00:59:02.145340 1708 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:59:02.144000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:02.144000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:02.144000 audit[1708]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003c26f0 a1=400080cde0 a2=40003c2690 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:02.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:02.145656 kubelet[1708]: I0702 00:59:02.145417 1708 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:59:02.145656 kubelet[1708]: I0702 00:59:02.145521 1708 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 00:59:02.145656 kubelet[1708]: I0702 00:59:02.145637 1708 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:59:02.147196 kubelet[1708]: E0702 00:59:02.146758 1708 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Jul 2 00:59:02.195859 kubelet[1708]: I0702 00:59:02.195830 1708 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:59:02.196824 kubelet[1708]: E0702 00:59:02.196127 1708 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Jul 2 00:59:02.220422 kubelet[1708]: I0702 00:59:02.220323 1708 topology_manager.go:215] "Topology Admit Handler" podUID="e075bb65c5974460d1617deac24a2906" podNamespace="kube-system" podName="kube-apiserver-localhost" Jul 2 00:59:02.221321 kubelet[1708]: I0702 00:59:02.221275 1708 topology_manager.go:215] "Topology Admit Handler" podUID="fd87124bd1ab6d9b01dedf07aaa171f7" podNamespace="kube-system" podName="kube-controller-manager-localhost" Jul 2 00:59:02.222731 kubelet[1708]: I0702 00:59:02.222013 1708 topology_manager.go:215] "Topology Admit Handler" podUID="5df30d679156d9b860331584e2d47675" podNamespace="kube-system" podName="kube-scheduler-localhost" Jul 2 00:59:02.229113 systemd[1]: Created slice kubepods-burstable-pode075bb65c5974460d1617deac24a2906.slice. Jul 2 00:59:02.251066 systemd[1]: Created slice kubepods-burstable-pod5df30d679156d9b860331584e2d47675.slice. Jul 2 00:59:02.264628 systemd[1]: Created slice kubepods-burstable-podfd87124bd1ab6d9b01dedf07aaa171f7.slice. Jul 2 00:59:02.295630 kubelet[1708]: I0702 00:59:02.295538 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:02.295630 kubelet[1708]: I0702 00:59:02.295601 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5df30d679156d9b860331584e2d47675-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5df30d679156d9b860331584e2d47675\") " pod="kube-system/kube-scheduler-localhost" Jul 2 00:59:02.295630 kubelet[1708]: I0702 00:59:02.295620 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:02.295741 kubelet[1708]: I0702 00:59:02.295636 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:02.295741 kubelet[1708]: I0702 00:59:02.295656 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:02.295741 kubelet[1708]: I0702 00:59:02.295671 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:02.295812 kubelet[1708]: I0702 00:59:02.295791 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:02.295812 kubelet[1708]: I0702 00:59:02.295808 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:02.295855 kubelet[1708]: I0702 00:59:02.295822 1708 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:02.295855 kubelet[1708]: E0702 00:59:02.295758 1708 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="400ms" Jul 2 00:59:02.397397 kubelet[1708]: I0702 00:59:02.397371 1708 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:59:02.397857 kubelet[1708]: E0702 00:59:02.397830 1708 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Jul 2 00:59:02.549543 kubelet[1708]: E0702 00:59:02.549448 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:02.550600 env[1212]: time="2024-07-02T00:59:02.550415683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e075bb65c5974460d1617deac24a2906,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:02.553650 kubelet[1708]: E0702 00:59:02.553618 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:02.554079 env[1212]: time="2024-07-02T00:59:02.553963324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5df30d679156d9b860331584e2d47675,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:02.564837 kubelet[1708]: E0702 00:59:02.564628 1708 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.115:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.115:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17de3f83958d7e20 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-07-02 00:59:02.084451872 +0000 UTC m=+0.560855862,LastTimestamp:2024-07-02 00:59:02.084451872 +0000 UTC m=+0.560855862,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Jul 2 00:59:02.566542 kubelet[1708]: E0702 00:59:02.566509 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:02.567006 env[1212]: time="2024-07-02T00:59:02.566964538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:fd87124bd1ab6d9b01dedf07aaa171f7,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:02.697225 kubelet[1708]: E0702 00:59:02.697170 1708 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="800ms" Jul 2 00:59:02.799247 kubelet[1708]: I0702 00:59:02.799221 1708 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:59:02.799728 kubelet[1708]: E0702 00:59:02.799650 1708 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Jul 2 00:59:03.039762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount12815804.mount: Deactivated successfully. Jul 2 00:59:03.047179 env[1212]: time="2024-07-02T00:59:03.047097316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.049029 env[1212]: time="2024-07-02T00:59:03.048981447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.052472 env[1212]: time="2024-07-02T00:59:03.052353693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.053510 env[1212]: time="2024-07-02T00:59:03.053444790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.055302 env[1212]: time="2024-07-02T00:59:03.055265539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.057132 env[1212]: time="2024-07-02T00:59:03.056555025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.058459 env[1212]: time="2024-07-02T00:59:03.058362769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.060632 env[1212]: time="2024-07-02T00:59:03.060591499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.061256 env[1212]: time="2024-07-02T00:59:03.061231200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.063694 env[1212]: time="2024-07-02T00:59:03.063641593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.065958 env[1212]: time="2024-07-02T00:59:03.065925663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.066688 env[1212]: time="2024-07-02T00:59:03.066654194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:03.106022 env[1212]: time="2024-07-02T00:59:03.105766990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:03.106022 env[1212]: time="2024-07-02T00:59:03.105813046Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:03.106022 env[1212]: time="2024-07-02T00:59:03.105824090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:03.107612 env[1212]: time="2024-07-02T00:59:03.106566226Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b162b574d4f2f821af516ab6ae729374bcf938421a2ea528a5743cf2ade16a4 pid=1760 runtime=io.containerd.runc.v2 Jul 2 00:59:03.108710 env[1212]: time="2024-07-02T00:59:03.108628939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:03.108710 env[1212]: time="2024-07-02T00:59:03.108684478Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:03.108911 env[1212]: time="2024-07-02T00:59:03.108696362Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:03.109205 env[1212]: time="2024-07-02T00:59:03.109156682Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:03.109205 env[1212]: time="2024-07-02T00:59:03.109191373Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:03.109296 env[1212]: time="2024-07-02T00:59:03.109202978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:03.109445 env[1212]: time="2024-07-02T00:59:03.109399245Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/769d7b0566dcf70ba75be957ab3fe17a5fca586db4315435bec4e8881875b4ce pid=1771 runtime=io.containerd.runc.v2 Jul 2 00:59:03.109593 env[1212]: time="2024-07-02T00:59:03.109533092Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90cb7eadafdacd378dc305141420d0617727bc7e51de5892181a333df814097d pid=1766 runtime=io.containerd.runc.v2 Jul 2 00:59:03.122521 systemd[1]: Started cri-containerd-1b162b574d4f2f821af516ab6ae729374bcf938421a2ea528a5743cf2ade16a4.scope. Jul 2 00:59:03.123442 systemd[1]: Started cri-containerd-769d7b0566dcf70ba75be957ab3fe17a5fca586db4315435bec4e8881875b4ce.scope. Jul 2 00:59:03.125667 systemd[1]: Started cri-containerd-90cb7eadafdacd378dc305141420d0617727bc7e51de5892181a333df814097d.scope. Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.159000 audit: BPF prog-id=55 op=LOAD Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736396437623035363664636637306261373562653935376162336665 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736396437623035363664636637306261373562653935376162336665 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit: BPF prog-id=56 op=LOAD Jul 2 00:59:03.160000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.160000 audit: BPF prog-id=57 op=LOAD Jul 2 00:59:03.160000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736396437623035363664636637306261373562653935376162336665 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1766 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636237656164616664616364333738646333303531343134323064 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1766 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636237656164616664616364333738646333303531343134323064 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit: BPF prog-id=58 op=LOAD Jul 2 00:59:03.161000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1766 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636237656164616664616364333738646333303531343134323064 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit: BPF prog-id=59 op=LOAD Jul 2 00:59:03.161000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1766 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636237656164616664616364333738646333303531343134323064 Jul 2 00:59:03.162000 audit: BPF prog-id=59 op=UNLOAD Jul 2 00:59:03.162000 audit: BPF prog-id=58 op=UNLOAD Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit: BPF prog-id=60 op=LOAD Jul 2 00:59:03.162000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1766 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636237656164616664616364333738646333303531343134323064 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit: BPF prog-id=61 op=LOAD Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1760 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313632623537346434663266383231616635313661623661653732 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1760 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313632623537346434663266383231616635313661623661653732 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit: BPF prog-id=62 op=LOAD Jul 2 00:59:03.163000 audit[1786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1760 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313632623537346434663266383231616635313661623661653732 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit: BPF prog-id=63 op=LOAD Jul 2 00:59:03.163000 audit[1786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1760 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313632623537346434663266383231616635313661623661653732 Jul 2 00:59:03.163000 audit: BPF prog-id=63 op=UNLOAD Jul 2 00:59:03.163000 audit: BPF prog-id=62 op=UNLOAD Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.163000 audit: BPF prog-id=64 op=LOAD Jul 2 00:59:03.163000 audit[1786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1760 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313632623537346434663266383231616635313661623661653732 Jul 2 00:59:03.161000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.161000 audit: BPF prog-id=65 op=LOAD Jul 2 00:59:03.161000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736396437623035363664636637306261373562653935376162336665 Jul 2 00:59:03.164000 audit: BPF prog-id=65 op=UNLOAD Jul 2 00:59:03.164000 audit: BPF prog-id=57 op=UNLOAD Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.164000 audit: BPF prog-id=66 op=LOAD Jul 2 00:59:03.164000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736396437623035363664636637306261373562653935376162336665 Jul 2 00:59:03.182243 env[1212]: time="2024-07-02T00:59:03.182203003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e075bb65c5974460d1617deac24a2906,Namespace:kube-system,Attempt:0,} returns sandbox id \"90cb7eadafdacd378dc305141420d0617727bc7e51de5892181a333df814097d\"" Jul 2 00:59:03.184025 kubelet[1708]: E0702 00:59:03.183748 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:03.188255 env[1212]: time="2024-07-02T00:59:03.188216601Z" level=info msg="CreateContainer within sandbox \"90cb7eadafdacd378dc305141420d0617727bc7e51de5892181a333df814097d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 00:59:03.190660 env[1212]: time="2024-07-02T00:59:03.190612069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:fd87124bd1ab6d9b01dedf07aaa171f7,Namespace:kube-system,Attempt:0,} returns sandbox id \"769d7b0566dcf70ba75be957ab3fe17a5fca586db4315435bec4e8881875b4ce\"" Jul 2 00:59:03.191621 kubelet[1708]: E0702 00:59:03.191381 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:03.191722 env[1212]: time="2024-07-02T00:59:03.191401222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5df30d679156d9b860331584e2d47675,Namespace:kube-system,Attempt:0,} returns sandbox id \"1b162b574d4f2f821af516ab6ae729374bcf938421a2ea528a5743cf2ade16a4\"" Jul 2 00:59:03.192456 kubelet[1708]: E0702 00:59:03.192420 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:03.193976 env[1212]: time="2024-07-02T00:59:03.193931976Z" level=info msg="CreateContainer within sandbox \"769d7b0566dcf70ba75be957ab3fe17a5fca586db4315435bec4e8881875b4ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 00:59:03.195533 env[1212]: time="2024-07-02T00:59:03.195490635Z" level=info msg="CreateContainer within sandbox \"1b162b574d4f2f821af516ab6ae729374bcf938421a2ea528a5743cf2ade16a4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 00:59:03.204746 env[1212]: time="2024-07-02T00:59:03.204700898Z" level=info msg="CreateContainer within sandbox \"90cb7eadafdacd378dc305141420d0617727bc7e51de5892181a333df814097d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ce4182261c19566fbc795bac7b898b0574484b382503171b40d1d7b9f04cd5bc\"" Jul 2 00:59:03.205513 env[1212]: time="2024-07-02T00:59:03.205476846Z" level=info msg="StartContainer for \"ce4182261c19566fbc795bac7b898b0574484b382503171b40d1d7b9f04cd5bc\"" Jul 2 00:59:03.211659 env[1212]: time="2024-07-02T00:59:03.211617208Z" level=info msg="CreateContainer within sandbox \"769d7b0566dcf70ba75be957ab3fe17a5fca586db4315435bec4e8881875b4ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6e31f7c04590ac68daaba4b5c0bdb53eb079522b622cb99c7ae9cbe407dcd25d\"" Jul 2 00:59:03.212061 env[1212]: time="2024-07-02T00:59:03.212033872Z" level=info msg="StartContainer for \"6e31f7c04590ac68daaba4b5c0bdb53eb079522b622cb99c7ae9cbe407dcd25d\"" Jul 2 00:59:03.213891 env[1212]: time="2024-07-02T00:59:03.213852940Z" level=info msg="CreateContainer within sandbox \"1b162b574d4f2f821af516ab6ae729374bcf938421a2ea528a5743cf2ade16a4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e95ff0cc5c89a1104c89a06eba01c26ff873018a53ccd027ed5af7652e18aaef\"" Jul 2 00:59:03.214375 env[1212]: time="2024-07-02T00:59:03.214348511Z" level=info msg="StartContainer for \"e95ff0cc5c89a1104c89a06eba01c26ff873018a53ccd027ed5af7652e18aaef\"" Jul 2 00:59:03.221337 systemd[1]: Started cri-containerd-ce4182261c19566fbc795bac7b898b0574484b382503171b40d1d7b9f04cd5bc.scope. Jul 2 00:59:03.226276 kubelet[1708]: W0702 00:59:03.226185 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.226276 kubelet[1708]: E0702 00:59:03.226281 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.230420 systemd[1]: Started cri-containerd-6e31f7c04590ac68daaba4b5c0bdb53eb079522b622cb99c7ae9cbe407dcd25d.scope. Jul 2 00:59:03.245084 systemd[1]: Started cri-containerd-e95ff0cc5c89a1104c89a06eba01c26ff873018a53ccd027ed5af7652e18aaef.scope. Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.263000 audit: BPF prog-id=67 op=LOAD Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1771 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333166376330343539306163363864616162613462356330626462 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1771 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333166376330343539306163363864616162613462356330626462 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit: BPF prog-id=68 op=LOAD Jul 2 00:59:03.264000 audit[1895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1771 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333166376330343539306163363864616162613462356330626462 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit: BPF prog-id=69 op=LOAD Jul 2 00:59:03.264000 audit[1895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1771 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333166376330343539306163363864616162613462356330626462 Jul 2 00:59:03.264000 audit: BPF prog-id=69 op=UNLOAD Jul 2 00:59:03.264000 audit: BPF prog-id=68 op=UNLOAD Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { perfmon } for pid=1895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit[1895]: AVC avc: denied { bpf } for pid=1895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.264000 audit: BPF prog-id=70 op=LOAD Jul 2 00:59:03.264000 audit[1895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1771 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333166376330343539306163363864616162613462356330626462 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit: BPF prog-id=71 op=LOAD Jul 2 00:59:03.271000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1912]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1760 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356666306363356338396131313034633839613036656261303163 Jul 2 00:59:03.271000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.271000 audit[1912]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1760 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356666306363356338396131313034633839613036656261303163 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit: BPF prog-id=72 op=LOAD Jul 2 00:59:03.272000 audit[1912]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1760 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356666306363356338396131313034633839613036656261303163 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit: BPF prog-id=73 op=LOAD Jul 2 00:59:03.272000 audit[1912]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1760 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356666306363356338396131313034633839613036656261303163 Jul 2 00:59:03.272000 audit: BPF prog-id=73 op=UNLOAD Jul 2 00:59:03.272000 audit: BPF prog-id=72 op=UNLOAD Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.272000 audit: BPF prog-id=74 op=LOAD Jul 2 00:59:03.272000 audit[1912]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1760 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356666306363356338396131313034633839613036656261303163 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.273000 audit: BPF prog-id=75 op=LOAD Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1766 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343138323236316331393536366662633739356261633762383938 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1766 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343138323236316331393536366662633739356261633762383938 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit: BPF prog-id=76 op=LOAD Jul 2 00:59:03.274000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1766 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343138323236316331393536366662633739356261633762383938 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.274000 audit: BPF prog-id=77 op=LOAD Jul 2 00:59:03.274000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1766 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343138323236316331393536366662633739356261633762383938 Jul 2 00:59:03.274000 audit: BPF prog-id=77 op=UNLOAD Jul 2 00:59:03.274000 audit: BPF prog-id=76 op=UNLOAD Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:03.275000 audit: BPF prog-id=78 op=LOAD Jul 2 00:59:03.275000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1766 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:03.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343138323236316331393536366662633739356261633762383938 Jul 2 00:59:03.298507 env[1212]: time="2024-07-02T00:59:03.298467619Z" level=info msg="StartContainer for \"6e31f7c04590ac68daaba4b5c0bdb53eb079522b622cb99c7ae9cbe407dcd25d\" returns successfully" Jul 2 00:59:03.312615 env[1212]: time="2024-07-02T00:59:03.303929747Z" level=info msg="StartContainer for \"ce4182261c19566fbc795bac7b898b0574484b382503171b40d1d7b9f04cd5bc\" returns successfully" Jul 2 00:59:03.320357 env[1212]: time="2024-07-02T00:59:03.320302485Z" level=info msg="StartContainer for \"e95ff0cc5c89a1104c89a06eba01c26ff873018a53ccd027ed5af7652e18aaef\" returns successfully" Jul 2 00:59:03.379327 kubelet[1708]: W0702 00:59:03.379239 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.379327 kubelet[1708]: E0702 00:59:03.379304 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.470518 kubelet[1708]: W0702 00:59:03.470417 1708 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.470518 kubelet[1708]: E0702 00:59:03.470492 1708 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Jul 2 00:59:03.500651 kubelet[1708]: E0702 00:59:03.500603 1708 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="1.6s" Jul 2 00:59:03.601880 kubelet[1708]: I0702 00:59:03.601779 1708 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:59:04.125939 kubelet[1708]: E0702 00:59:04.125910 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:04.128048 kubelet[1708]: E0702 00:59:04.128010 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:04.129722 kubelet[1708]: E0702 00:59:04.129699 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:04.789000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:04.791098 kernel: kauditd_printk_skb: 561 callbacks suppressed Jul 2 00:59:04.791133 kernel: audit: type=1400 audit(1719881944.789:553): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:04.789000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000bc200 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:04.795969 kernel: audit: type=1300 audit(1719881944.789:553): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000bc200 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:04.796018 kernel: audit: type=1327 audit(1719881944.789:553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:04.789000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:04.790000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:04.800392 kernel: audit: type=1400 audit(1719881944.790:554): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:04.790000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008d8390 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:04.803310 kernel: audit: type=1300 audit(1719881944.790:554): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008d8390 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:04.803357 kernel: audit: type=1327 audit(1719881944.790:554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:04.790000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:05.131252 kubelet[1708]: E0702 00:59:05.131160 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:05.533592 kubelet[1708]: E0702 00:59:05.533546 1708 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:05.631000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.631000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40071fef90 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.638515 kernel: audit: type=1400 audit(1719881945.631:555): avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.638625 kernel: audit: type=1300 audit(1719881945.631:555): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40071fef90 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.638667 kernel: audit: type=1400 audit(1719881945.632:556): avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.632000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.640629 kernel: audit: type=1300 audit(1719881945.632:556): arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=40043cbbc0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.632000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=40043cbbc0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.631000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.642000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.642000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=400395a030 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.642000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.643000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.643000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40071ff080 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.643000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.646000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.646000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4004b3c700 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.646000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.647000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:05.647000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=40038dd3e0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 00:59:05.647000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 00:59:05.714999 kubelet[1708]: E0702 00:59:05.714944 1708 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Jul 2 00:59:05.808867 kubelet[1708]: I0702 00:59:05.808756 1708 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Jul 2 00:59:05.816388 kubelet[1708]: E0702 00:59:05.816345 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 2 00:59:05.917048 kubelet[1708]: E0702 00:59:05.916995 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 2 00:59:06.017638 kubelet[1708]: E0702 00:59:06.017592 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 2 00:59:06.118020 kubelet[1708]: E0702 00:59:06.117863 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 2 00:59:06.218569 kubelet[1708]: E0702 00:59:06.218499 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 2 00:59:07.084367 kubelet[1708]: I0702 00:59:07.084331 1708 apiserver.go:52] "Watching apiserver" Jul 2 00:59:07.095689 kubelet[1708]: I0702 00:59:07.095652 1708 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 00:59:07.985458 systemd[1]: Reloading. Jul 2 00:59:08.052016 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2024-07-02T00:59:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:59:08.052045 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2024-07-02T00:59:08Z" level=info msg="torcx already run" Jul 2 00:59:08.103453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:59:08.103665 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:59:08.118729 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit: BPF prog-id=79 op=LOAD Jul 2 00:59:08.180000 audit: BPF prog-id=40 op=UNLOAD Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit: BPF prog-id=80 op=LOAD Jul 2 00:59:08.181000 audit: BPF prog-id=56 op=UNLOAD Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit: BPF prog-id=81 op=LOAD Jul 2 00:59:08.182000 audit: BPF prog-id=41 op=UNLOAD Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit: BPF prog-id=82 op=LOAD Jul 2 00:59:08.183000 audit: BPF prog-id=42 op=UNLOAD Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit: BPF prog-id=83 op=LOAD Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.184000 audit: BPF prog-id=84 op=LOAD Jul 2 00:59:08.184000 audit: BPF prog-id=43 op=UNLOAD Jul 2 00:59:08.184000 audit: BPF prog-id=44 op=UNLOAD Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.185000 audit: BPF prog-id=85 op=LOAD Jul 2 00:59:08.185000 audit: BPF prog-id=45 op=UNLOAD Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit: BPF prog-id=86 op=LOAD Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit: BPF prog-id=87 op=LOAD Jul 2 00:59:08.186000 audit: BPF prog-id=46 op=UNLOAD Jul 2 00:59:08.186000 audit: BPF prog-id=47 op=UNLOAD Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit: BPF prog-id=88 op=LOAD Jul 2 00:59:08.187000 audit: BPF prog-id=67 op=UNLOAD Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit: BPF prog-id=89 op=LOAD Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.187000 audit: BPF prog-id=90 op=LOAD Jul 2 00:59:08.187000 audit: BPF prog-id=48 op=UNLOAD Jul 2 00:59:08.187000 audit: BPF prog-id=49 op=UNLOAD Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit: BPF prog-id=91 op=LOAD Jul 2 00:59:08.188000 audit: BPF prog-id=75 op=UNLOAD Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.188000 audit: BPF prog-id=92 op=LOAD Jul 2 00:59:08.188000 audit: BPF prog-id=61 op=UNLOAD Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.189000 audit: BPF prog-id=93 op=LOAD Jul 2 00:59:08.189000 audit: BPF prog-id=55 op=UNLOAD Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.191000 audit: BPF prog-id=94 op=LOAD Jul 2 00:59:08.191000 audit: BPF prog-id=71 op=UNLOAD Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.192000 audit: BPF prog-id=95 op=LOAD Jul 2 00:59:08.192000 audit: BPF prog-id=50 op=UNLOAD Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit: BPF prog-id=96 op=LOAD Jul 2 00:59:08.193000 audit: BPF prog-id=51 op=UNLOAD Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit: BPF prog-id=97 op=LOAD Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit: BPF prog-id=98 op=LOAD Jul 2 00:59:08.193000 audit: BPF prog-id=52 op=UNLOAD Jul 2 00:59:08.193000 audit: BPF prog-id=53 op=UNLOAD Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.194000 audit: BPF prog-id=99 op=LOAD Jul 2 00:59:08.194000 audit: BPF prog-id=54 op=UNLOAD Jul 2 00:59:08.210305 kubelet[1708]: I0702 00:59:08.210271 1708 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:59:08.210538 systemd[1]: Stopping kubelet.service... Jul 2 00:59:08.232885 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:59:08.233090 systemd[1]: Stopped kubelet.service. Jul 2 00:59:08.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:08.234816 systemd[1]: Starting kubelet.service... Jul 2 00:59:08.319461 systemd[1]: Started kubelet.service. Jul 2 00:59:08.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:08.366512 kubelet[2051]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:59:08.366851 kubelet[2051]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:59:08.366903 kubelet[2051]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:59:08.367046 kubelet[2051]: I0702 00:59:08.367008 2051 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:59:08.372209 kubelet[2051]: I0702 00:59:08.372179 2051 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 00:59:08.372209 kubelet[2051]: I0702 00:59:08.372205 2051 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:59:08.372387 kubelet[2051]: I0702 00:59:08.372373 2051 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 00:59:08.373630 kubelet[2051]: I0702 00:59:08.373611 2051 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 00:59:08.374821 kubelet[2051]: I0702 00:59:08.374791 2051 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:59:08.382873 kubelet[2051]: I0702 00:59:08.382847 2051 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:59:08.383635 kubelet[2051]: I0702 00:59:08.383565 2051 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:59:08.383980 kubelet[2051]: I0702 00:59:08.383780 2051 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:59:08.384134 kubelet[2051]: I0702 00:59:08.384119 2051 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:59:08.384198 kubelet[2051]: I0702 00:59:08.384188 2051 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:59:08.384279 kubelet[2051]: I0702 00:59:08.384269 2051 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:59:08.384415 kubelet[2051]: I0702 00:59:08.384402 2051 kubelet.go:400] "Attempting to sync node with API server" Jul 2 00:59:08.384486 kubelet[2051]: I0702 00:59:08.384475 2051 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:59:08.384556 kubelet[2051]: I0702 00:59:08.384547 2051 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:59:08.384637 kubelet[2051]: I0702 00:59:08.384625 2051 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:59:08.388000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.388000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:08.388000 audit[2051]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b886f0 a1=400061b6e0 a2=4000b886c0 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:08.388000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:08.388000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.388000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:08.388000 audit[2051]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009f0f00 a1=400061b6f8 a2=4000b88780 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:08.388000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.386854 2051 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.387011 2051 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.387449 2051 server.go:1264] "Started kubelet" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.388029 2051 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.388256 2051 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.389188 2051 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.389232 2051 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.389257 2051 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:59:08.393502 kubelet[2051]: I0702 00:59:08.393149 2051 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:59:08.397298 kubelet[2051]: I0702 00:59:08.393942 2051 server.go:455] "Adding debug handlers to kubelet server" Jul 2 00:59:08.397298 kubelet[2051]: I0702 00:59:08.395832 2051 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:59:08.397298 kubelet[2051]: I0702 00:59:08.397202 2051 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 00:59:08.397390 kubelet[2051]: I0702 00:59:08.397322 2051 reconciler.go:26] "Reconciler: start to sync state" Jul 2 00:59:08.399656 kubelet[2051]: I0702 00:59:08.399620 2051 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:59:08.400406 kubelet[2051]: I0702 00:59:08.400385 2051 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:59:08.400453 kubelet[2051]: I0702 00:59:08.400419 2051 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:59:08.400453 kubelet[2051]: I0702 00:59:08.400436 2051 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 00:59:08.400495 kubelet[2051]: E0702 00:59:08.400472 2051 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:59:08.404929 kubelet[2051]: I0702 00:59:08.404898 2051 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:59:08.407389 kubelet[2051]: I0702 00:59:08.406243 2051 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:59:08.407389 kubelet[2051]: I0702 00:59:08.406266 2051 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:59:08.453674 kubelet[2051]: I0702 00:59:08.453644 2051 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:59:08.453674 kubelet[2051]: I0702 00:59:08.453667 2051 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:59:08.453806 kubelet[2051]: I0702 00:59:08.453689 2051 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:59:08.453854 kubelet[2051]: I0702 00:59:08.453836 2051 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 00:59:08.453906 kubelet[2051]: I0702 00:59:08.453854 2051 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 00:59:08.453906 kubelet[2051]: I0702 00:59:08.453873 2051 policy_none.go:49] "None policy: Start" Jul 2 00:59:08.454498 kubelet[2051]: I0702 00:59:08.454479 2051 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:59:08.454558 kubelet[2051]: I0702 00:59:08.454504 2051 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:59:08.454680 kubelet[2051]: I0702 00:59:08.454664 2051 state_mem.go:75] "Updated machine memory state" Jul 2 00:59:08.458192 kubelet[2051]: I0702 00:59:08.458167 2051 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:59:08.457000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:08.457000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:59:08.457000 audit[2051]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006903f0 a1=4000c6e3c0 a2=40006903c0 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:08.457000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:59:08.458436 kubelet[2051]: I0702 00:59:08.458344 2051 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:59:08.459433 kubelet[2051]: I0702 00:59:08.458484 2051 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 00:59:08.459433 kubelet[2051]: I0702 00:59:08.458659 2051 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:59:08.498651 kubelet[2051]: I0702 00:59:08.498619 2051 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:59:08.501188 kubelet[2051]: I0702 00:59:08.500894 2051 topology_manager.go:215] "Topology Admit Handler" podUID="e075bb65c5974460d1617deac24a2906" podNamespace="kube-system" podName="kube-apiserver-localhost" Jul 2 00:59:08.501360 kubelet[2051]: I0702 00:59:08.501252 2051 topology_manager.go:215] "Topology Admit Handler" podUID="fd87124bd1ab6d9b01dedf07aaa171f7" podNamespace="kube-system" podName="kube-controller-manager-localhost" Jul 2 00:59:08.501417 kubelet[2051]: I0702 00:59:08.501395 2051 topology_manager.go:215] "Topology Admit Handler" podUID="5df30d679156d9b860331584e2d47675" podNamespace="kube-system" podName="kube-scheduler-localhost" Jul 2 00:59:08.503983 kubelet[2051]: I0702 00:59:08.503962 2051 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Jul 2 00:59:08.504145 kubelet[2051]: I0702 00:59:08.504131 2051 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Jul 2 00:59:08.598020 kubelet[2051]: I0702 00:59:08.597923 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5df30d679156d9b860331584e2d47675-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5df30d679156d9b860331584e2d47675\") " pod="kube-system/kube-scheduler-localhost" Jul 2 00:59:08.598192 kubelet[2051]: I0702 00:59:08.598172 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:08.598279 kubelet[2051]: I0702 00:59:08.598265 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:08.598360 kubelet[2051]: I0702 00:59:08.598343 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:08.598445 kubelet[2051]: I0702 00:59:08.598432 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:08.598727 kubelet[2051]: I0702 00:59:08.598652 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e075bb65c5974460d1617deac24a2906-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e075bb65c5974460d1617deac24a2906\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:59:08.598863 kubelet[2051]: I0702 00:59:08.598797 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:08.598931 kubelet[2051]: I0702 00:59:08.598915 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:08.599007 kubelet[2051]: I0702 00:59:08.598940 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fd87124bd1ab6d9b01dedf07aaa171f7-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"fd87124bd1ab6d9b01dedf07aaa171f7\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:59:08.825299 kubelet[2051]: E0702 00:59:08.825262 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:08.827026 kubelet[2051]: E0702 00:59:08.827004 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:08.829150 kubelet[2051]: E0702 00:59:08.829128 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:09.011000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 00:59:09.011000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c90500 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:09.011000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:09.385538 kubelet[2051]: I0702 00:59:09.385435 2051 apiserver.go:52] "Watching apiserver" Jul 2 00:59:09.397389 kubelet[2051]: I0702 00:59:09.397356 2051 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 00:59:09.435968 kubelet[2051]: E0702 00:59:09.435941 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:09.436323 kubelet[2051]: E0702 00:59:09.436292 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:09.436635 kubelet[2051]: E0702 00:59:09.436610 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:09.452540 kubelet[2051]: I0702 00:59:09.452489 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.452474305 podStartE2EDuration="1.452474305s" podCreationTimestamp="2024-07-02 00:59:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:09.452010566 +0000 UTC m=+1.128327672" watchObservedRunningTime="2024-07-02 00:59:09.452474305 +0000 UTC m=+1.128791411" Jul 2 00:59:09.463521 kubelet[2051]: I0702 00:59:09.463476 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.463460931 podStartE2EDuration="1.463460931s" podCreationTimestamp="2024-07-02 00:59:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:09.457565947 +0000 UTC m=+1.133883013" watchObservedRunningTime="2024-07-02 00:59:09.463460931 +0000 UTC m=+1.139778037" Jul 2 00:59:10.437446 kubelet[2051]: E0702 00:59:10.437404 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:11.007848 kubelet[2051]: E0702 00:59:11.007817 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:11.439322 kubelet[2051]: E0702 00:59:11.439232 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:13.061431 sudo[1352]: pam_unix(sudo:session): session closed for user root Jul 2 00:59:13.059000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:59:13.062052 kernel: kauditd_printk_skb: 275 callbacks suppressed Jul 2 00:59:13.062101 kernel: audit: type=1106 audit(1719881953.059:811): pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:59:13.063608 sshd[1348]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:13.060000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:59:13.066339 kernel: audit: type=1104 audit(1719881953.060:812): pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:59:13.066398 kernel: audit: type=1106 audit(1719881953.063:813): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:13.063000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:13.067162 systemd[1]: sshd@6-10.0.0.115:22-10.0.0.1:60742.service: Deactivated successfully. Jul 2 00:59:13.067922 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 00:59:13.068075 systemd[1]: session-7.scope: Consumed 6.460s CPU time. Jul 2 00:59:13.068441 systemd-logind[1201]: Session 7 logged out. Waiting for processes to exit. Jul 2 00:59:13.063000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:13.069328 systemd-logind[1201]: Removed session 7. Jul 2 00:59:13.071093 kernel: audit: type=1104 audit(1719881953.063:814): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:13.071160 kernel: audit: type=1131 audit(1719881953.065:815): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:13.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:18.026815 kubelet[2051]: E0702 00:59:18.026774 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:18.039649 kubelet[2051]: I0702 00:59:18.039602 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=10.039562112 podStartE2EDuration="10.039562112s" podCreationTimestamp="2024-07-02 00:59:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:09.463680359 +0000 UTC m=+1.139997465" watchObservedRunningTime="2024-07-02 00:59:18.039562112 +0000 UTC m=+9.715879178" Jul 2 00:59:18.447542 kubelet[2051]: E0702 00:59:18.447290 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b4840 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.070871 kernel: audit: type=1400 audit(1719881959.065:816): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.070946 kernel: audit: type=1300 audit(1719881959.065:816): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b4840 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.071028 kernel: audit: type=1327 audit(1719881959.065:816): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.075960 kernel: audit: type=1400 audit(1719881959.065:817): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.076045 kernel: audit: type=1300 audit(1719881959.065:817): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b4880 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b4880 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.081500 kernel: audit: type=1327 audit(1719881959.065:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.081553 kernel: audit: type=1400 audit(1719881959.066:818): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.066000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.066000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b48c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.087179 kernel: audit: type=1300 audit(1719881959.066:818): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b48c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.087249 kernel: audit: type=1327 audit(1719881959.066:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:19.066000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.092238 kernel: audit: type=1400 audit(1719881959.066:819): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:59:19.066000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003b4940 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 00:59:19.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:59:20.207687 kubelet[2051]: E0702 00:59:20.207637 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:20.450597 kubelet[2051]: E0702 00:59:20.450555 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:21.014108 kubelet[2051]: E0702 00:59:21.014077 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:22.018497 update_engine[1202]: I0702 00:59:22.018442 1202 update_attempter.cc:509] Updating boot flags... Jul 2 00:59:22.296002 kubelet[2051]: I0702 00:59:22.295891 2051 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 00:59:22.296303 env[1212]: time="2024-07-02T00:59:22.296191766Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 00:59:22.296502 kubelet[2051]: I0702 00:59:22.296371 2051 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 00:59:23.291844 kubelet[2051]: I0702 00:59:23.291801 2051 topology_manager.go:215] "Topology Admit Handler" podUID="8425f64c-5d70-42cc-85f6-f27a0a2ad596" podNamespace="kube-system" podName="kube-proxy-qr59f" Jul 2 00:59:23.297129 systemd[1]: Created slice kubepods-besteffort-pod8425f64c_5d70_42cc_85f6_f27a0a2ad596.slice. Jul 2 00:59:23.308429 kubelet[2051]: I0702 00:59:23.308346 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8425f64c-5d70-42cc-85f6-f27a0a2ad596-lib-modules\") pod \"kube-proxy-qr59f\" (UID: \"8425f64c-5d70-42cc-85f6-f27a0a2ad596\") " pod="kube-system/kube-proxy-qr59f" Jul 2 00:59:23.308429 kubelet[2051]: I0702 00:59:23.308380 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8hjlq\" (UniqueName: \"kubernetes.io/projected/8425f64c-5d70-42cc-85f6-f27a0a2ad596-kube-api-access-8hjlq\") pod \"kube-proxy-qr59f\" (UID: \"8425f64c-5d70-42cc-85f6-f27a0a2ad596\") " pod="kube-system/kube-proxy-qr59f" Jul 2 00:59:23.308429 kubelet[2051]: I0702 00:59:23.308409 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8425f64c-5d70-42cc-85f6-f27a0a2ad596-kube-proxy\") pod \"kube-proxy-qr59f\" (UID: \"8425f64c-5d70-42cc-85f6-f27a0a2ad596\") " pod="kube-system/kube-proxy-qr59f" Jul 2 00:59:23.308429 kubelet[2051]: I0702 00:59:23.308428 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8425f64c-5d70-42cc-85f6-f27a0a2ad596-xtables-lock\") pod \"kube-proxy-qr59f\" (UID: \"8425f64c-5d70-42cc-85f6-f27a0a2ad596\") " pod="kube-system/kube-proxy-qr59f" Jul 2 00:59:23.408413 kubelet[2051]: I0702 00:59:23.408359 2051 topology_manager.go:215] "Topology Admit Handler" podUID="90b8bb14-84df-4196-911d-584ce06a03c1" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-cklx6" Jul 2 00:59:23.417452 systemd[1]: Created slice kubepods-besteffort-pod90b8bb14_84df_4196_911d_584ce06a03c1.slice. Jul 2 00:59:23.510673 kubelet[2051]: I0702 00:59:23.510625 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5p7cm\" (UniqueName: \"kubernetes.io/projected/90b8bb14-84df-4196-911d-584ce06a03c1-kube-api-access-5p7cm\") pod \"tigera-operator-76ff79f7fd-cklx6\" (UID: \"90b8bb14-84df-4196-911d-584ce06a03c1\") " pod="tigera-operator/tigera-operator-76ff79f7fd-cklx6" Jul 2 00:59:23.510788 kubelet[2051]: I0702 00:59:23.510683 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/90b8bb14-84df-4196-911d-584ce06a03c1-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-cklx6\" (UID: \"90b8bb14-84df-4196-911d-584ce06a03c1\") " pod="tigera-operator/tigera-operator-76ff79f7fd-cklx6" Jul 2 00:59:23.605620 kubelet[2051]: E0702 00:59:23.605478 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:23.606373 env[1212]: time="2024-07-02T00:59:23.605981565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qr59f,Uid:8425f64c-5d70-42cc-85f6-f27a0a2ad596,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:23.623532 env[1212]: time="2024-07-02T00:59:23.621817147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:23.623532 env[1212]: time="2024-07-02T00:59:23.621854549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:23.623532 env[1212]: time="2024-07-02T00:59:23.621864510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:23.623532 env[1212]: time="2024-07-02T00:59:23.622009358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c pid=2161 runtime=io.containerd.runc.v2 Jul 2 00:59:23.640345 systemd[1]: Started cri-containerd-5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c.scope. Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit: BPF prog-id=100 op=LOAD Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562326262336461613561306665383735356636646532626632616462 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562326262336461613561306665383735356636646532626632616462 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit: BPF prog-id=101 op=LOAD Jul 2 00:59:23.665000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562326262336461613561306665383735356636646532626632616462 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit: BPF prog-id=102 op=LOAD Jul 2 00:59:23.665000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562326262336461613561306665383735356636646532626632616462 Jul 2 00:59:23.665000 audit: BPF prog-id=102 op=UNLOAD Jul 2 00:59:23.665000 audit: BPF prog-id=101 op=UNLOAD Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.665000 audit: BPF prog-id=103 op=LOAD Jul 2 00:59:23.665000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562326262336461613561306665383735356636646532626632616462 Jul 2 00:59:23.678190 env[1212]: time="2024-07-02T00:59:23.678151256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qr59f,Uid:8425f64c-5d70-42cc-85f6-f27a0a2ad596,Namespace:kube-system,Attempt:0,} returns sandbox id \"5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c\"" Jul 2 00:59:23.678858 kubelet[2051]: E0702 00:59:23.678831 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:23.680779 env[1212]: time="2024-07-02T00:59:23.680750850Z" level=info msg="CreateContainer within sandbox \"5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 00:59:23.698729 env[1212]: time="2024-07-02T00:59:23.698655035Z" level=info msg="CreateContainer within sandbox \"5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"81f966590ac1e2e724a978b7cc78f4847472f09b711a57770bd48862f199d407\"" Jul 2 00:59:23.700050 env[1212]: time="2024-07-02T00:59:23.700016836Z" level=info msg="StartContainer for \"81f966590ac1e2e724a978b7cc78f4847472f09b711a57770bd48862f199d407\"" Jul 2 00:59:23.714731 systemd[1]: Started cri-containerd-81f966590ac1e2e724a978b7cc78f4847472f09b711a57770bd48862f199d407.scope. Jul 2 00:59:23.722504 env[1212]: time="2024-07-02T00:59:23.722186154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-cklx6,Uid:90b8bb14-84df-4196-911d-584ce06a03c1,Namespace:tigera-operator,Attempt:0,}" Jul 2 00:59:23.732000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.732000 audit[2203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2161 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663936363539306163316532653732346139373862376363373866 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit: BPF prog-id=104 op=LOAD Jul 2 00:59:23.733000 audit[2203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2161 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663936363539306163316532653732346139373862376363373866 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit: BPF prog-id=105 op=LOAD Jul 2 00:59:23.733000 audit[2203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2161 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663936363539306163316532653732346139373862376363373866 Jul 2 00:59:23.733000 audit: BPF prog-id=105 op=UNLOAD Jul 2 00:59:23.733000 audit: BPF prog-id=104 op=UNLOAD Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.733000 audit: BPF prog-id=106 op=LOAD Jul 2 00:59:23.733000 audit[2203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2161 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663936363539306163316532653732346139373862376363373866 Jul 2 00:59:23.741261 env[1212]: time="2024-07-02T00:59:23.741188843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:23.741261 env[1212]: time="2024-07-02T00:59:23.741227326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:23.741384 env[1212]: time="2024-07-02T00:59:23.741238086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:23.741450 env[1212]: time="2024-07-02T00:59:23.741383935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eada6436246faf77d50c93bdd502bcce425937d082627fe1584fb1dc688f142a pid=2227 runtime=io.containerd.runc.v2 Jul 2 00:59:23.752292 systemd[1]: Started cri-containerd-eada6436246faf77d50c93bdd502bcce425937d082627fe1584fb1dc688f142a.scope. Jul 2 00:59:23.766207 env[1212]: time="2024-07-02T00:59:23.763042103Z" level=info msg="StartContainer for \"81f966590ac1e2e724a978b7cc78f4847472f09b711a57770bd48862f199d407\" returns successfully" Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.787000 audit: BPF prog-id=107 op=LOAD Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2227 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561646136343336323436666166373764353063393362646435303262 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2227 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561646136343336323436666166373764353063393362646435303262 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit: BPF prog-id=108 op=LOAD Jul 2 00:59:23.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2227 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561646136343336323436666166373764353063393362646435303262 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit: BPF prog-id=109 op=LOAD Jul 2 00:59:23.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2227 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561646136343336323436666166373764353063393362646435303262 Jul 2 00:59:23.788000 audit: BPF prog-id=109 op=UNLOAD Jul 2 00:59:23.788000 audit: BPF prog-id=108 op=UNLOAD Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:23.788000 audit: BPF prog-id=110 op=LOAD Jul 2 00:59:23.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2227 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561646136343336323436666166373764353063393362646435303262 Jul 2 00:59:23.810611 env[1212]: time="2024-07-02T00:59:23.810543206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-cklx6,Uid:90b8bb14-84df-4196-911d-584ce06a03c1,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"eada6436246faf77d50c93bdd502bcce425937d082627fe1584fb1dc688f142a\"" Jul 2 00:59:23.812395 env[1212]: time="2024-07-02T00:59:23.812314712Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 00:59:23.884000 audit[2296]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:23.884000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbfa11e0 a2=0 a3=1 items=0 ppid=2214 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:59:23.884000 audit[2297]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.884000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6d740e0 a2=0 a3=1 items=0 ppid=2214 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:59:23.885000 audit[2298]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:23.885000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4c8bc60 a2=0 a3=1 items=0 ppid=2214 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:59:23.885000 audit[2299]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.885000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5a697f0 a2=0 a3=1 items=0 ppid=2214 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:59:23.887000 audit[2301]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.887000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd966f2a0 a2=0 a3=1 items=0 ppid=2214 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:59:23.888000 audit[2300]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:23.888000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7523580 a2=0 a3=1 items=0 ppid=2214 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:59:23.986000 audit[2302]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.986000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe6eae0a0 a2=0 a3=1 items=0 ppid=2214 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:59:23.992000 audit[2304]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.992000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff24e91b0 a2=0 a3=1 items=0 ppid=2214 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 00:59:23.999000 audit[2307]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:23.999000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd7747f00 a2=0 a3=1 items=0 ppid=2214 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:23.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 00:59:24.001000 audit[2308]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.001000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc30671f0 a2=0 a3=1 items=0 ppid=2214 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:59:24.005000 audit[2310]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.005000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc3ce48f0 a2=0 a3=1 items=0 ppid=2214 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:59:24.006000 audit[2311]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.006000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4cb5d40 a2=0 a3=1 items=0 ppid=2214 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:59:24.010000 audit[2313]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.010000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc0008a00 a2=0 a3=1 items=0 ppid=2214 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:59:24.014000 audit[2316]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.014000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc0facb10 a2=0 a3=1 items=0 ppid=2214 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 00:59:24.015000 audit[2317]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.015000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3a68540 a2=0 a3=1 items=0 ppid=2214 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:59:24.017000 audit[2319]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.017000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed3e07a0 a2=0 a3=1 items=0 ppid=2214 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:59:24.018000 audit[2320]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.018000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedcff5b0 a2=0 a3=1 items=0 ppid=2214 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:59:24.021000 audit[2322]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.021000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc9bde20 a2=0 a3=1 items=0 ppid=2214 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:59:24.025000 audit[2325]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.025000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3c69d20 a2=0 a3=1 items=0 ppid=2214 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:59:24.030000 audit[2328]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.030000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5f942d0 a2=0 a3=1 items=0 ppid=2214 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:59:24.032000 audit[2329]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.032000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff426ab70 a2=0 a3=1 items=0 ppid=2214 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:59:24.035000 audit[2331]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.035000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd4e5b530 a2=0 a3=1 items=0 ppid=2214 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:59:24.039000 audit[2334]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.039000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffca146e10 a2=0 a3=1 items=0 ppid=2214 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:59:24.041000 audit[2335]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.041000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd343e450 a2=0 a3=1 items=0 ppid=2214 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:59:24.044000 audit[2337]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:59:24.044000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffea47bea0 a2=0 a3=1 items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:59:24.065000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:24.068725 kernel: kauditd_printk_skb: 234 callbacks suppressed Jul 2 00:59:24.068767 kernel: audit: type=1325 audit(1719881964.065:887): table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:24.068784 kernel: audit: type=1300 audit(1719881964.065:887): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffed706260 a2=0 a3=1 items=0 ppid=2214 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.065000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffed706260 a2=0 a3=1 items=0 ppid=2214 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.072786 kernel: audit: type=1327 audit(1719881964.065:887): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.076000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:24.076000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffed706260 a2=0 a3=1 items=0 ppid=2214 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.082815 kernel: audit: type=1325 audit(1719881964.076:888): table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:24.082853 kernel: audit: type=1300 audit(1719881964.076:888): arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffed706260 a2=0 a3=1 items=0 ppid=2214 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.084272 kernel: audit: type=1327 audit(1719881964.076:888): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.078000 audit[2347]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.086655 kernel: audit: type=1325 audit(1719881964.078:889): table=filter:65 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.078000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe141cf20 a2=0 a3=1 items=0 ppid=2214 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.089550 kernel: audit: type=1300 audit(1719881964.078:889): arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe141cf20 a2=0 a3=1 items=0 ppid=2214 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:59:24.091117 kernel: audit: type=1327 audit(1719881964.078:889): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:59:24.080000 audit[2349]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.092605 kernel: audit: type=1325 audit(1719881964.080:890): table=filter:66 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.080000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbcae210 a2=0 a3=1 items=0 ppid=2214 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 00:59:24.084000 audit[2352]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.084000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffebc29b30 a2=0 a3=1 items=0 ppid=2214 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 00:59:24.085000 audit[2353]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.085000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcfc43470 a2=0 a3=1 items=0 ppid=2214 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:59:24.088000 audit[2355]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.088000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2b495b0 a2=0 a3=1 items=0 ppid=2214 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:59:24.089000 audit[2356]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.089000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6fde140 a2=0 a3=1 items=0 ppid=2214 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:59:24.092000 audit[2358]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.092000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff17da8b0 a2=0 a3=1 items=0 ppid=2214 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 00:59:24.096000 audit[2361]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.096000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcfd9e2e0 a2=0 a3=1 items=0 ppid=2214 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:59:24.097000 audit[2362]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.097000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7706f00 a2=0 a3=1 items=0 ppid=2214 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:59:24.100000 audit[2364]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.100000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffccbf49e0 a2=0 a3=1 items=0 ppid=2214 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:59:24.102000 audit[2365]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.102000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3115650 a2=0 a3=1 items=0 ppid=2214 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:59:24.105000 audit[2367]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.105000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee49da00 a2=0 a3=1 items=0 ppid=2214 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:59:24.109000 audit[2370]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.109000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffef7118c0 a2=0 a3=1 items=0 ppid=2214 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:59:24.113000 audit[2373]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.113000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6e11a80 a2=0 a3=1 items=0 ppid=2214 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 00:59:24.114000 audit[2374]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.114000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdb1a02f0 a2=0 a3=1 items=0 ppid=2214 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:59:24.117000 audit[2376]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.117000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffee08a090 a2=0 a3=1 items=0 ppid=2214 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:59:24.120000 audit[2379]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.120000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff1122930 a2=0 a3=1 items=0 ppid=2214 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:59:24.121000 audit[2380]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.121000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefe3de60 a2=0 a3=1 items=0 ppid=2214 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:59:24.123000 audit[2382]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.123000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe843a0e0 a2=0 a3=1 items=0 ppid=2214 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:59:24.125000 audit[2383]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.125000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdad50860 a2=0 a3=1 items=0 ppid=2214 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:59:24.128000 audit[2385]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.128000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc18e6750 a2=0 a3=1 items=0 ppid=2214 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:59:24.132000 audit[2388]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:59:24.132000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd726f00 a2=0 a3=1 items=0 ppid=2214 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:59:24.135000 audit[2390]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:59:24.135000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff33e5e90 a2=0 a3=1 items=0 ppid=2214 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.135000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.136000 audit[2390]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:59:24.136000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff33e5e90 a2=0 a3=1 items=0 ppid=2214 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:24.136000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:24.429801 systemd[1]: run-containerd-runc-k8s.io-5b2bb3daa5a0fe8755f6de2bf2adbfd1349a81748746e9e9259c632b6456e35c-runc.lMdQXm.mount: Deactivated successfully. Jul 2 00:59:24.459402 kubelet[2051]: E0702 00:59:24.458864 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:24.468946 kubelet[2051]: I0702 00:59:24.468736 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-qr59f" podStartSLOduration=1.468719648 podStartE2EDuration="1.468719648s" podCreationTimestamp="2024-07-02 00:59:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:24.468509756 +0000 UTC m=+16.144826862" watchObservedRunningTime="2024-07-02 00:59:24.468719648 +0000 UTC m=+16.145036754" Jul 2 00:59:24.702270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount919667111.mount: Deactivated successfully. Jul 2 00:59:25.325566 env[1212]: time="2024-07-02T00:59:25.325369881Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:25.328635 env[1212]: time="2024-07-02T00:59:25.328601175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:25.330329 env[1212]: time="2024-07-02T00:59:25.330293506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:25.331873 env[1212]: time="2024-07-02T00:59:25.331843390Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:25.332388 env[1212]: time="2024-07-02T00:59:25.332347657Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92\"" Jul 2 00:59:25.336636 env[1212]: time="2024-07-02T00:59:25.336600767Z" level=info msg="CreateContainer within sandbox \"eada6436246faf77d50c93bdd502bcce425937d082627fe1584fb1dc688f142a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 00:59:25.349938 env[1212]: time="2024-07-02T00:59:25.349896324Z" level=info msg="CreateContainer within sandbox \"eada6436246faf77d50c93bdd502bcce425937d082627fe1584fb1dc688f142a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c0613878714caaa93aa7540f5139ebb44c2bb56e0ecd7a718fdc65c3030691e5\"" Jul 2 00:59:25.351500 env[1212]: time="2024-07-02T00:59:25.350467155Z" level=info msg="StartContainer for \"c0613878714caaa93aa7540f5139ebb44c2bb56e0ecd7a718fdc65c3030691e5\"" Jul 2 00:59:25.364496 systemd[1]: Started cri-containerd-c0613878714caaa93aa7540f5139ebb44c2bb56e0ecd7a718fdc65c3030691e5.scope. Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.402000 audit: BPF prog-id=111 op=LOAD Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2227 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:25.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363133383738373134636161613933616137353430663531333965 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2227 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:25.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363133383738373134636161613933616137353430663531333965 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit: BPF prog-id=112 op=LOAD Jul 2 00:59:25.403000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2227 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:25.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363133383738373134636161613933616137353430663531333965 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit: BPF prog-id=113 op=LOAD Jul 2 00:59:25.403000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2227 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:25.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363133383738373134636161613933616137353430663531333965 Jul 2 00:59:25.403000 audit: BPF prog-id=113 op=UNLOAD Jul 2 00:59:25.403000 audit: BPF prog-id=112 op=UNLOAD Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:25.403000 audit: BPF prog-id=114 op=LOAD Jul 2 00:59:25.403000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2227 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:25.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363133383738373134636161613933616137353430663531333965 Jul 2 00:59:25.421159 env[1212]: time="2024-07-02T00:59:25.421088724Z" level=info msg="StartContainer for \"c0613878714caaa93aa7540f5139ebb44c2bb56e0ecd7a718fdc65c3030691e5\" returns successfully" Jul 2 00:59:29.207608 kernel: kauditd_printk_skb: 125 callbacks suppressed Jul 2 00:59:29.207741 kernel: audit: type=1325 audit(1719881969.202:931): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.207768 kernel: audit: type=1300 audit(1719881969.202:931): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc740d120 a2=0 a3=1 items=0 ppid=2214 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.202000 audit[2432]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.202000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc740d120 a2=0 a3=1 items=0 ppid=2214 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.210086 kernel: audit: type=1327 audit(1719881969.202:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.203000 audit[2432]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.203000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc740d120 a2=0 a3=1 items=0 ppid=2214 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.214989 kernel: audit: type=1325 audit(1719881969.203:932): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.215054 kernel: audit: type=1300 audit(1719881969.203:932): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc740d120 a2=0 a3=1 items=0 ppid=2214 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.215089 kernel: audit: type=1327 audit(1719881969.203:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.212000 audit[2434]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.212000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7452420 a2=0 a3=1 items=0 ppid=2214 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.225623 kernel: audit: type=1325 audit(1719881969.212:933): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.225671 kernel: audit: type=1300 audit(1719881969.212:933): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7452420 a2=0 a3=1 items=0 ppid=2214 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.225709 kernel: audit: type=1327 audit(1719881969.212:933): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.220000 audit[2434]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.220000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7452420 a2=0 a3=1 items=0 ppid=2214 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:29.234592 kernel: audit: type=1325 audit(1719881969.220:934): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:29.346987 kubelet[2051]: I0702 00:59:29.346924 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-cklx6" podStartSLOduration=4.825417562 podStartE2EDuration="6.346905428s" podCreationTimestamp="2024-07-02 00:59:23 +0000 UTC" firstStartedPulling="2024-07-02 00:59:23.811865405 +0000 UTC m=+15.488182511" lastFinishedPulling="2024-07-02 00:59:25.333353271 +0000 UTC m=+17.009670377" observedRunningTime="2024-07-02 00:59:25.475260007 +0000 UTC m=+17.151577113" watchObservedRunningTime="2024-07-02 00:59:29.346905428 +0000 UTC m=+21.023222534" Jul 2 00:59:29.347861 kubelet[2051]: I0702 00:59:29.347824 2051 topology_manager.go:215] "Topology Admit Handler" podUID="b7baaaf9-8611-46cd-8eaa-5907c14272e3" podNamespace="calico-system" podName="calico-typha-6c95586656-4rwzb" Jul 2 00:59:29.355210 systemd[1]: Created slice kubepods-besteffort-podb7baaaf9_8611_46cd_8eaa_5907c14272e3.slice. Jul 2 00:59:29.406625 kubelet[2051]: I0702 00:59:29.406563 2051 topology_manager.go:215] "Topology Admit Handler" podUID="1b9ae0be-8f2d-457f-ab50-f6e72336faf4" podNamespace="calico-system" podName="calico-node-nxsbd" Jul 2 00:59:29.411777 systemd[1]: Created slice kubepods-besteffort-pod1b9ae0be_8f2d_457f_ab50_f6e72336faf4.slice. Jul 2 00:59:29.446110 kubelet[2051]: I0702 00:59:29.446061 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-tigera-ca-bundle\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446110 kubelet[2051]: I0702 00:59:29.446107 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-node-certs\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446277 kubelet[2051]: I0702 00:59:29.446126 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-var-run-calico\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446277 kubelet[2051]: I0702 00:59:29.446144 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-var-lib-calico\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446277 kubelet[2051]: I0702 00:59:29.446160 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b7baaaf9-8611-46cd-8eaa-5907c14272e3-tigera-ca-bundle\") pod \"calico-typha-6c95586656-4rwzb\" (UID: \"b7baaaf9-8611-46cd-8eaa-5907c14272e3\") " pod="calico-system/calico-typha-6c95586656-4rwzb" Jul 2 00:59:29.446277 kubelet[2051]: I0702 00:59:29.446218 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-cni-net-dir\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446277 kubelet[2051]: I0702 00:59:29.446255 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nwllp\" (UniqueName: \"kubernetes.io/projected/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-kube-api-access-nwllp\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446394 kubelet[2051]: I0702 00:59:29.446280 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-lib-modules\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446394 kubelet[2051]: I0702 00:59:29.446299 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-cni-log-dir\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446394 kubelet[2051]: I0702 00:59:29.446317 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-xtables-lock\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446394 kubelet[2051]: I0702 00:59:29.446336 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p8qpv\" (UniqueName: \"kubernetes.io/projected/b7baaaf9-8611-46cd-8eaa-5907c14272e3-kube-api-access-p8qpv\") pod \"calico-typha-6c95586656-4rwzb\" (UID: \"b7baaaf9-8611-46cd-8eaa-5907c14272e3\") " pod="calico-system/calico-typha-6c95586656-4rwzb" Jul 2 00:59:29.446394 kubelet[2051]: I0702 00:59:29.446351 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-policysync\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446501 kubelet[2051]: I0702 00:59:29.446366 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-flexvol-driver-host\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.446501 kubelet[2051]: I0702 00:59:29.446384 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b7baaaf9-8611-46cd-8eaa-5907c14272e3-typha-certs\") pod \"calico-typha-6c95586656-4rwzb\" (UID: \"b7baaaf9-8611-46cd-8eaa-5907c14272e3\") " pod="calico-system/calico-typha-6c95586656-4rwzb" Jul 2 00:59:29.446501 kubelet[2051]: I0702 00:59:29.446399 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1b9ae0be-8f2d-457f-ab50-f6e72336faf4-cni-bin-dir\") pod \"calico-node-nxsbd\" (UID: \"1b9ae0be-8f2d-457f-ab50-f6e72336faf4\") " pod="calico-system/calico-node-nxsbd" Jul 2 00:59:29.517520 kubelet[2051]: I0702 00:59:29.517359 2051 topology_manager.go:215] "Topology Admit Handler" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" podNamespace="calico-system" podName="csi-node-driver-t7hk6" Jul 2 00:59:29.517701 kubelet[2051]: E0702 00:59:29.517652 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:29.547329 kubelet[2051]: I0702 00:59:29.547286 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mnhw\" (UniqueName: \"kubernetes.io/projected/2e1f0999-4b54-4a92-8804-3d78fb6e8151-kube-api-access-7mnhw\") pod \"csi-node-driver-t7hk6\" (UID: \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\") " pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:29.547456 kubelet[2051]: I0702 00:59:29.547346 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2e1f0999-4b54-4a92-8804-3d78fb6e8151-registration-dir\") pod \"csi-node-driver-t7hk6\" (UID: \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\") " pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:29.547456 kubelet[2051]: I0702 00:59:29.547396 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2e1f0999-4b54-4a92-8804-3d78fb6e8151-kubelet-dir\") pod \"csi-node-driver-t7hk6\" (UID: \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\") " pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:29.547530 kubelet[2051]: I0702 00:59:29.547461 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2e1f0999-4b54-4a92-8804-3d78fb6e8151-varrun\") pod \"csi-node-driver-t7hk6\" (UID: \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\") " pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:29.547530 kubelet[2051]: I0702 00:59:29.547497 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2e1f0999-4b54-4a92-8804-3d78fb6e8151-socket-dir\") pod \"csi-node-driver-t7hk6\" (UID: \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\") " pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:29.548786 kubelet[2051]: E0702 00:59:29.548692 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.548786 kubelet[2051]: W0702 00:59:29.548721 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.548786 kubelet[2051]: E0702 00:59:29.548755 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.549062 kubelet[2051]: E0702 00:59:29.549015 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.549062 kubelet[2051]: W0702 00:59:29.549029 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.549062 kubelet[2051]: E0702 00:59:29.549043 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.549376 kubelet[2051]: E0702 00:59:29.549251 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.549376 kubelet[2051]: W0702 00:59:29.549264 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.549376 kubelet[2051]: E0702 00:59:29.549278 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.549506 kubelet[2051]: E0702 00:59:29.549487 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.549506 kubelet[2051]: W0702 00:59:29.549501 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.549588 kubelet[2051]: E0702 00:59:29.549513 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.550393 kubelet[2051]: E0702 00:59:29.550372 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.550485 kubelet[2051]: W0702 00:59:29.550466 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.550602 kubelet[2051]: E0702 00:59:29.550537 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.557249 kubelet[2051]: E0702 00:59:29.554042 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.557249 kubelet[2051]: W0702 00:59:29.554060 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.557249 kubelet[2051]: E0702 00:59:29.554079 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.557249 kubelet[2051]: E0702 00:59:29.554256 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.557249 kubelet[2051]: W0702 00:59:29.554264 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.557249 kubelet[2051]: E0702 00:59:29.554272 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.566326 kubelet[2051]: E0702 00:59:29.566305 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.566458 kubelet[2051]: W0702 00:59:29.566441 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.566521 kubelet[2051]: E0702 00:59:29.566509 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.572200 kubelet[2051]: E0702 00:59:29.572173 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.572311 kubelet[2051]: W0702 00:59:29.572210 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.572311 kubelet[2051]: E0702 00:59:29.572231 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.648734 kubelet[2051]: E0702 00:59:29.648687 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.648734 kubelet[2051]: W0702 00:59:29.648722 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.648734 kubelet[2051]: E0702 00:59:29.648743 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.649345 kubelet[2051]: E0702 00:59:29.649322 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.649345 kubelet[2051]: W0702 00:59:29.649341 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.649430 kubelet[2051]: E0702 00:59:29.649355 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.649584 kubelet[2051]: E0702 00:59:29.649556 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.649584 kubelet[2051]: W0702 00:59:29.649585 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.649672 kubelet[2051]: E0702 00:59:29.649602 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.649842 kubelet[2051]: E0702 00:59:29.649816 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.649842 kubelet[2051]: W0702 00:59:29.649833 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.649842 kubelet[2051]: E0702 00:59:29.649844 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.650041 kubelet[2051]: E0702 00:59:29.650023 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.650041 kubelet[2051]: W0702 00:59:29.650036 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.650105 kubelet[2051]: E0702 00:59:29.650051 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.653661 kubelet[2051]: E0702 00:59:29.653641 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.653942 kubelet[2051]: W0702 00:59:29.653926 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.654030 kubelet[2051]: E0702 00:59:29.654016 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.654344 kubelet[2051]: E0702 00:59:29.654304 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.654344 kubelet[2051]: W0702 00:59:29.654322 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.654344 kubelet[2051]: E0702 00:59:29.654341 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.654525 kubelet[2051]: E0702 00:59:29.654511 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.654525 kubelet[2051]: W0702 00:59:29.654523 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.654617 kubelet[2051]: E0702 00:59:29.654555 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.654790 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657507 kubelet[2051]: W0702 00:59:29.654799 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.654829 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.654950 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657507 kubelet[2051]: W0702 00:59:29.654957 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.654980 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.655211 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657507 kubelet[2051]: W0702 00:59:29.655219 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.655293 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657507 kubelet[2051]: E0702 00:59:29.655378 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657832 kubelet[2051]: W0702 00:59:29.655384 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.655451 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.655530 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657832 kubelet[2051]: W0702 00:59:29.655537 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.655550 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.655746 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657832 kubelet[2051]: W0702 00:59:29.655754 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.655763 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.657832 kubelet[2051]: E0702 00:59:29.656144 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.657832 kubelet[2051]: W0702 00:59:29.656155 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.658087 kubelet[2051]: E0702 00:59:29.656170 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.658087 kubelet[2051]: E0702 00:59:29.657557 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:29.658182 env[1212]: time="2024-07-02T00:59:29.658133311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c95586656-4rwzb,Uid:b7baaaf9-8611-46cd-8eaa-5907c14272e3,Namespace:calico-system,Attempt:0,}" Jul 2 00:59:29.658561 kubelet[2051]: E0702 00:59:29.658482 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.658561 kubelet[2051]: W0702 00:59:29.658493 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.658675 kubelet[2051]: E0702 00:59:29.658655 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.659277 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661637 kubelet[2051]: W0702 00:59:29.659294 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.659334 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.659502 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661637 kubelet[2051]: W0702 00:59:29.659511 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.659624 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.659848 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661637 kubelet[2051]: W0702 00:59:29.659860 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.660088 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661637 kubelet[2051]: W0702 00:59:29.660096 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661637 kubelet[2051]: E0702 00:59:29.660256 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661964 kubelet[2051]: W0702 00:59:29.660264 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660275 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660337 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660477 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660534 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661964 kubelet[2051]: W0702 00:59:29.660543 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660551 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660882 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.661964 kubelet[2051]: W0702 00:59:29.660918 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.661964 kubelet[2051]: E0702 00:59:29.660932 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.664348 kubelet[2051]: E0702 00:59:29.664328 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.664640 kubelet[2051]: W0702 00:59:29.664621 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.664868 kubelet[2051]: E0702 00:59:29.664851 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.665036 kubelet[2051]: E0702 00:59:29.665025 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.665353 kubelet[2051]: W0702 00:59:29.665334 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.665463 kubelet[2051]: E0702 00:59:29.665448 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.670450 kubelet[2051]: E0702 00:59:29.670429 2051 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:59:29.670594 kubelet[2051]: W0702 00:59:29.670558 2051 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:59:29.670663 kubelet[2051]: E0702 00:59:29.670650 2051 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:59:29.715039 kubelet[2051]: E0702 00:59:29.715007 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:29.716172 env[1212]: time="2024-07-02T00:59:29.715525046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nxsbd,Uid:1b9ae0be-8f2d-457f-ab50-f6e72336faf4,Namespace:calico-system,Attempt:0,}" Jul 2 00:59:29.734883 env[1212]: time="2024-07-02T00:59:29.734808231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:29.734883 env[1212]: time="2024-07-02T00:59:29.734854233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:29.734883 env[1212]: time="2024-07-02T00:59:29.734864433Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:29.735100 env[1212]: time="2024-07-02T00:59:29.735028000Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a486301008071fa79f4f95605bc7df4712306dff11344de2da62d614e7a70238 pid=2485 runtime=io.containerd.runc.v2 Jul 2 00:59:29.743500 env[1212]: time="2024-07-02T00:59:29.742462774Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:29.743500 env[1212]: time="2024-07-02T00:59:29.742503096Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:29.743500 env[1212]: time="2024-07-02T00:59:29.742512816Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:29.743500 env[1212]: time="2024-07-02T00:59:29.742708505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc pid=2503 runtime=io.containerd.runc.v2 Jul 2 00:59:29.754665 systemd[1]: Started cri-containerd-a486301008071fa79f4f95605bc7df4712306dff11344de2da62d614e7a70238.scope. Jul 2 00:59:29.766343 systemd[1]: Started cri-containerd-36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc.scope. Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.806000 audit: BPF prog-id=115 op=LOAD Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2485 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383633303130303830373166613739663466393536303562633764 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2485 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383633303130303830373166613739663466393536303562633764 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.809000 audit: BPF prog-id=116 op=LOAD Jul 2 00:59:29.809000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2485 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383633303130303830373166613739663466393536303562633764 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit: BPF prog-id=117 op=LOAD Jul 2 00:59:29.810000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2485 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383633303130303830373166613739663466393536303562633764 Jul 2 00:59:29.810000 audit: BPF prog-id=117 op=UNLOAD Jul 2 00:59:29.810000 audit: BPF prog-id=116 op=UNLOAD Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.810000 audit: BPF prog-id=118 op=LOAD Jul 2 00:59:29.810000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2485 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383633303130303830373166613739663466393536303562633764 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.816000 audit: BPF prog-id=119 op=LOAD Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2503 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613534626632386138653934623963633933623832343565633237 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2503 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613534626632386138653934623963633933623832343565633237 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit: BPF prog-id=120 op=LOAD Jul 2 00:59:29.817000 audit[2522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2503 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613534626632386138653934623963633933623832343565633237 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit: BPF prog-id=121 op=LOAD Jul 2 00:59:29.817000 audit[2522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2503 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613534626632386138653934623963633933623832343565633237 Jul 2 00:59:29.817000 audit: BPF prog-id=121 op=UNLOAD Jul 2 00:59:29.817000 audit: BPF prog-id=120 op=UNLOAD Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:29.817000 audit: BPF prog-id=122 op=LOAD Jul 2 00:59:29.817000 audit[2522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2503 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613534626632386138653934623963633933623832343565633237 Jul 2 00:59:29.836564 env[1212]: time="2024-07-02T00:59:29.836515914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nxsbd,Uid:1b9ae0be-8f2d-457f-ab50-f6e72336faf4,Namespace:calico-system,Attempt:0,} returns sandbox id \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\"" Jul 2 00:59:29.844161 kubelet[2051]: E0702 00:59:29.843909 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:29.845784 env[1212]: time="2024-07-02T00:59:29.843542109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c95586656-4rwzb,Uid:b7baaaf9-8611-46cd-8eaa-5907c14272e3,Namespace:calico-system,Attempt:0,} returns sandbox id \"a486301008071fa79f4f95605bc7df4712306dff11344de2da62d614e7a70238\"" Jul 2 00:59:29.847795 kubelet[2051]: E0702 00:59:29.847671 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:29.847970 env[1212]: time="2024-07-02T00:59:29.847919985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 00:59:30.235000 audit[2561]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:30.235000 audit[2561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdf5845f0 a2=0 a3=1 items=0 ppid=2214 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:30.237000 audit[2561]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:30.237000 audit[2561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf5845f0 a2=0 a3=1 items=0 ppid=2214 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.237000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:30.834508 env[1212]: time="2024-07-02T00:59:30.834429637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:30.836827 env[1212]: time="2024-07-02T00:59:30.835830178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:30.837298 env[1212]: time="2024-07-02T00:59:30.837256199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:30.838841 env[1212]: time="2024-07-02T00:59:30.838808265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:30.839264 env[1212]: time="2024-07-02T00:59:30.839230564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 00:59:30.840546 env[1212]: time="2024-07-02T00:59:30.840502178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 00:59:30.843109 env[1212]: time="2024-07-02T00:59:30.843057248Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 00:59:30.857907 env[1212]: time="2024-07-02T00:59:30.857859323Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f\"" Jul 2 00:59:30.859155 env[1212]: time="2024-07-02T00:59:30.859117977Z" level=info msg="StartContainer for \"5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f\"" Jul 2 00:59:30.877175 systemd[1]: Started cri-containerd-5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f.scope. Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2503 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566323964366266346566333030613336613436383834316538646366 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.904000 audit: BPF prog-id=123 op=LOAD Jul 2 00:59:30.904000 audit[2570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2503 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566323964366266346566333030613336613436383834316538646366 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit: BPF prog-id=124 op=LOAD Jul 2 00:59:30.905000 audit[2570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2503 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566323964366266346566333030613336613436383834316538646366 Jul 2 00:59:30.905000 audit: BPF prog-id=124 op=UNLOAD Jul 2 00:59:30.905000 audit: BPF prog-id=123 op=UNLOAD Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:30.905000 audit: BPF prog-id=125 op=LOAD Jul 2 00:59:30.905000 audit[2570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2503 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:30.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566323964366266346566333030613336613436383834316538646366 Jul 2 00:59:30.930898 env[1212]: time="2024-07-02T00:59:30.930847337Z" level=info msg="StartContainer for \"5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f\" returns successfully" Jul 2 00:59:30.954749 systemd[1]: cri-containerd-5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f.scope: Deactivated successfully. Jul 2 00:59:30.959000 audit: BPF prog-id=125 op=UNLOAD Jul 2 00:59:30.974936 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f-rootfs.mount: Deactivated successfully. Jul 2 00:59:31.003801 env[1212]: time="2024-07-02T00:59:31.002987833Z" level=info msg="shim disconnected" id=5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f Jul 2 00:59:31.003801 env[1212]: time="2024-07-02T00:59:31.003035394Z" level=warning msg="cleaning up after shim disconnected" id=5f29d6bf4ef300a36a468841e8dcf4ce73631e2f8e4eb1b6f00c7008cb6e620f namespace=k8s.io Jul 2 00:59:31.003801 env[1212]: time="2024-07-02T00:59:31.003045315Z" level=info msg="cleaning up dead shim" Jul 2 00:59:31.009859 env[1212]: time="2024-07-02T00:59:31.009819793Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:59:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2609 runtime=io.containerd.runc.v2\n" Jul 2 00:59:31.403675 kubelet[2051]: E0702 00:59:31.403633 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:31.486661 kubelet[2051]: E0702 00:59:31.486169 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:32.510677 env[1212]: time="2024-07-02T00:59:32.510636655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:32.513764 env[1212]: time="2024-07-02T00:59:32.513734097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:32.518026 env[1212]: time="2024-07-02T00:59:32.517993705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:32.522676 env[1212]: time="2024-07-02T00:59:32.522638568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:32.522928 env[1212]: time="2024-07-02T00:59:32.522893458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03\"" Jul 2 00:59:32.524738 env[1212]: time="2024-07-02T00:59:32.524696649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 00:59:32.532491 env[1212]: time="2024-07-02T00:59:32.531763728Z" level=info msg="CreateContainer within sandbox \"a486301008071fa79f4f95605bc7df4712306dff11344de2da62d614e7a70238\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 00:59:32.547132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1529366708.mount: Deactivated successfully. Jul 2 00:59:32.555360 env[1212]: time="2024-07-02T00:59:32.555308656Z" level=info msg="CreateContainer within sandbox \"a486301008071fa79f4f95605bc7df4712306dff11344de2da62d614e7a70238\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"21ffa9c176bb8a5e2b8af3fb8bbe7c057bb620e15e455a73c24376f6f49bea0c\"" Jul 2 00:59:32.555824 env[1212]: time="2024-07-02T00:59:32.555795036Z" level=info msg="StartContainer for \"21ffa9c176bb8a5e2b8af3fb8bbe7c057bb620e15e455a73c24376f6f49bea0c\"" Jul 2 00:59:32.576649 systemd[1]: Started cri-containerd-21ffa9c176bb8a5e2b8af3fb8bbe7c057bb620e15e455a73c24376f6f49bea0c.scope. Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit: BPF prog-id=126 op=LOAD Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2485 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231666661396331373662623861356532623861663366623862626537 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2485 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231666661396331373662623861356532623861663366623862626537 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit: BPF prog-id=127 op=LOAD Jul 2 00:59:32.599000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2485 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231666661396331373662623861356532623861663366623862626537 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit: BPF prog-id=128 op=LOAD Jul 2 00:59:32.599000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2485 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231666661396331373662623861356532623861663366623862626537 Jul 2 00:59:32.599000 audit: BPF prog-id=128 op=UNLOAD Jul 2 00:59:32.599000 audit: BPF prog-id=127 op=UNLOAD Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:32.599000 audit: BPF prog-id=129 op=LOAD Jul 2 00:59:32.599000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2485 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231666661396331373662623861356532623861663366623862626537 Jul 2 00:59:32.632612 env[1212]: time="2024-07-02T00:59:32.630478981Z" level=info msg="StartContainer for \"21ffa9c176bb8a5e2b8af3fb8bbe7c057bb620e15e455a73c24376f6f49bea0c\" returns successfully" Jul 2 00:59:33.401624 kubelet[2051]: E0702 00:59:33.401556 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:33.490167 kubelet[2051]: E0702 00:59:33.490124 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:33.506459 kubelet[2051]: I0702 00:59:33.506401 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6c95586656-4rwzb" podStartSLOduration=1.830187598 podStartE2EDuration="4.506386798s" podCreationTimestamp="2024-07-02 00:59:29 +0000 UTC" firstStartedPulling="2024-07-02 00:59:29.848112474 +0000 UTC m=+21.524429580" lastFinishedPulling="2024-07-02 00:59:32.524311714 +0000 UTC m=+24.200628780" observedRunningTime="2024-07-02 00:59:33.505751693 +0000 UTC m=+25.182068799" watchObservedRunningTime="2024-07-02 00:59:33.506386798 +0000 UTC m=+25.182703904" Jul 2 00:59:34.492485 kubelet[2051]: I0702 00:59:34.492169 2051 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:59:34.492906 kubelet[2051]: E0702 00:59:34.492877 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:35.401704 kubelet[2051]: E0702 00:59:35.401656 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:35.915344 env[1212]: time="2024-07-02T00:59:35.915288355Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:35.916501 env[1212]: time="2024-07-02T00:59:35.916452395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:35.917847 env[1212]: time="2024-07-02T00:59:35.917819243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:35.919132 env[1212]: time="2024-07-02T00:59:35.919092408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:35.919671 env[1212]: time="2024-07-02T00:59:35.919631746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 00:59:35.922312 env[1212]: time="2024-07-02T00:59:35.922279319Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 00:59:35.933087 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1865303262.mount: Deactivated successfully. Jul 2 00:59:35.936210 env[1212]: time="2024-07-02T00:59:35.936161764Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02\"" Jul 2 00:59:35.937805 env[1212]: time="2024-07-02T00:59:35.937776981Z" level=info msg="StartContainer for \"90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02\"" Jul 2 00:59:35.956084 systemd[1]: run-containerd-runc-k8s.io-90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02-runc.LTo4Fl.mount: Deactivated successfully. Jul 2 00:59:35.957520 systemd[1]: Started cri-containerd-90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02.scope. Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001816 kernel: kauditd_printk_skb: 223 callbacks suppressed Jul 2 00:59:36.001879 kernel: audit: type=1400 audit(1719881976.000:998): avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2503 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:36.006079 kernel: audit: type=1300 audit(1719881976.000:998): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2503 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:36.006132 kernel: audit: type=1327 audit(1719881976.000:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666363643731376436613062616238323939316633366339363463 Jul 2 00:59:36.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666363643731376436613062616238323939316633366339363463 Jul 2 00:59:36.008432 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.011716 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.011773 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.013331 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.016762 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.016810 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.020115 kernel: audit: type=1400 audit(1719881976.000:999): avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.000000 audit: BPF prog-id=130 op=LOAD Jul 2 00:59:36.000000 audit[2677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2503 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:36.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666363643731376436613062616238323939316633366339363463 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.001000 audit: BPF prog-id=131 op=LOAD Jul 2 00:59:36.001000 audit[2677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2503 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:36.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666363643731376436613062616238323939316633366339363463 Jul 2 00:59:36.003000 audit: BPF prog-id=131 op=UNLOAD Jul 2 00:59:36.003000 audit: BPF prog-id=130 op=UNLOAD Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:36.003000 audit: BPF prog-id=132 op=LOAD Jul 2 00:59:36.003000 audit[2677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2503 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:36.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666363643731376436613062616238323939316633366339363463 Jul 2 00:59:36.031046 env[1212]: time="2024-07-02T00:59:36.030998520Z" level=info msg="StartContainer for \"90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02\" returns successfully" Jul 2 00:59:36.424569 env[1212]: time="2024-07-02T00:59:36.424504282Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:59:36.427000 systemd[1]: cri-containerd-90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02.scope: Deactivated successfully. Jul 2 00:59:36.430000 audit: BPF prog-id=132 op=UNLOAD Jul 2 00:59:36.496490 kubelet[2051]: E0702 00:59:36.496444 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:36.522406 kubelet[2051]: I0702 00:59:36.521606 2051 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 00:59:36.557003 env[1212]: time="2024-07-02T00:59:36.556940899Z" level=info msg="shim disconnected" id=90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02 Jul 2 00:59:36.557003 env[1212]: time="2024-07-02T00:59:36.557000461Z" level=warning msg="cleaning up after shim disconnected" id=90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02 namespace=k8s.io Jul 2 00:59:36.557003 env[1212]: time="2024-07-02T00:59:36.557012181Z" level=info msg="cleaning up dead shim" Jul 2 00:59:36.580834 kubelet[2051]: I0702 00:59:36.579933 2051 topology_manager.go:215] "Topology Admit Handler" podUID="11698b24-20f9-48a6-a5bb-64a45c9c4b88" podNamespace="kube-system" podName="coredns-7db6d8ff4d-pdm7q" Jul 2 00:59:36.580834 kubelet[2051]: I0702 00:59:36.580167 2051 topology_manager.go:215] "Topology Admit Handler" podUID="1b25cfd0-b6c3-49e6-a63d-5a37c1451e86" podNamespace="kube-system" podName="coredns-7db6d8ff4d-bv7qs" Jul 2 00:59:36.580834 kubelet[2051]: I0702 00:59:36.580328 2051 topology_manager.go:215] "Topology Admit Handler" podUID="271669f5-ff18-44c4-98a9-386c9abbddbc" podNamespace="calico-system" podName="calico-kube-controllers-8d6774f6f-q8d79" Jul 2 00:59:36.591332 env[1212]: time="2024-07-02T00:59:36.591272014Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:59:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2719 runtime=io.containerd.runc.v2\n" Jul 2 00:59:36.592816 systemd[1]: Created slice kubepods-burstable-pod11698b24_20f9_48a6_a5bb_64a45c9c4b88.slice. Jul 2 00:59:36.597847 kubelet[2051]: I0702 00:59:36.597108 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/271669f5-ff18-44c4-98a9-386c9abbddbc-tigera-ca-bundle\") pod \"calico-kube-controllers-8d6774f6f-q8d79\" (UID: \"271669f5-ff18-44c4-98a9-386c9abbddbc\") " pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" Jul 2 00:59:36.597847 kubelet[2051]: I0702 00:59:36.597203 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/11698b24-20f9-48a6-a5bb-64a45c9c4b88-config-volume\") pod \"coredns-7db6d8ff4d-pdm7q\" (UID: \"11698b24-20f9-48a6-a5bb-64a45c9c4b88\") " pod="kube-system/coredns-7db6d8ff4d-pdm7q" Jul 2 00:59:36.597847 kubelet[2051]: I0702 00:59:36.597342 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wsshd\" (UniqueName: \"kubernetes.io/projected/11698b24-20f9-48a6-a5bb-64a45c9c4b88-kube-api-access-wsshd\") pod \"coredns-7db6d8ff4d-pdm7q\" (UID: \"11698b24-20f9-48a6-a5bb-64a45c9c4b88\") " pod="kube-system/coredns-7db6d8ff4d-pdm7q" Jul 2 00:59:36.597847 kubelet[2051]: I0702 00:59:36.597660 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1b25cfd0-b6c3-49e6-a63d-5a37c1451e86-config-volume\") pod \"coredns-7db6d8ff4d-bv7qs\" (UID: \"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86\") " pod="kube-system/coredns-7db6d8ff4d-bv7qs" Jul 2 00:59:36.597847 kubelet[2051]: I0702 00:59:36.597846 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hgpq\" (UniqueName: \"kubernetes.io/projected/271669f5-ff18-44c4-98a9-386c9abbddbc-kube-api-access-5hgpq\") pod \"calico-kube-controllers-8d6774f6f-q8d79\" (UID: \"271669f5-ff18-44c4-98a9-386c9abbddbc\") " pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" Jul 2 00:59:36.598152 kubelet[2051]: I0702 00:59:36.597935 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57fc4\" (UniqueName: \"kubernetes.io/projected/1b25cfd0-b6c3-49e6-a63d-5a37c1451e86-kube-api-access-57fc4\") pod \"coredns-7db6d8ff4d-bv7qs\" (UID: \"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86\") " pod="kube-system/coredns-7db6d8ff4d-bv7qs" Jul 2 00:59:36.599452 systemd[1]: Created slice kubepods-besteffort-pod271669f5_ff18_44c4_98a9_386c9abbddbc.slice. Jul 2 00:59:36.608522 systemd[1]: Created slice kubepods-burstable-pod1b25cfd0_b6c3_49e6_a63d_5a37c1451e86.slice. Jul 2 00:59:36.896603 kubelet[2051]: E0702 00:59:36.896545 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:36.897438 env[1212]: time="2024-07-02T00:59:36.897319233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdm7q,Uid:11698b24-20f9-48a6-a5bb-64a45c9c4b88,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:36.904290 env[1212]: time="2024-07-02T00:59:36.904240226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8d6774f6f-q8d79,Uid:271669f5-ff18-44c4-98a9-386c9abbddbc,Namespace:calico-system,Attempt:0,}" Jul 2 00:59:36.912242 kubelet[2051]: E0702 00:59:36.911912 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:36.913384 env[1212]: time="2024-07-02T00:59:36.913338492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bv7qs,Uid:1b25cfd0-b6c3-49e6-a63d-5a37c1451e86,Namespace:kube-system,Attempt:0,}" Jul 2 00:59:36.940416 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-90fccd717d6a0bab82991f36c964cb1adc7fbc62cd7be008ad79a48c685f3a02-rootfs.mount: Deactivated successfully. Jul 2 00:59:37.119432 env[1212]: time="2024-07-02T00:59:37.119355840Z" level=error msg="Failed to destroy network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.121229 env[1212]: time="2024-07-02T00:59:37.121188060Z" level=error msg="encountered an error cleaning up failed sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.121352 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0-shm.mount: Deactivated successfully. Jul 2 00:59:37.121789 env[1212]: time="2024-07-02T00:59:37.121347545Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bv7qs,Uid:1b25cfd0-b6c3-49e6-a63d-5a37c1451e86,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.123406 kubelet[2051]: E0702 00:59:37.123343 2051 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.123522 kubelet[2051]: E0702 00:59:37.123447 2051 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bv7qs" Jul 2 00:59:37.123522 kubelet[2051]: E0702 00:59:37.123470 2051 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bv7qs" Jul 2 00:59:37.123603 kubelet[2051]: E0702 00:59:37.123518 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-bv7qs_kube-system(1b25cfd0-b6c3-49e6-a63d-5a37c1451e86)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-bv7qs_kube-system(1b25cfd0-b6c3-49e6-a63d-5a37c1451e86)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bv7qs" podUID="1b25cfd0-b6c3-49e6-a63d-5a37c1451e86" Jul 2 00:59:37.127863 env[1212]: time="2024-07-02T00:59:37.127807594Z" level=error msg="Failed to destroy network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.128448 env[1212]: time="2024-07-02T00:59:37.128405614Z" level=error msg="encountered an error cleaning up failed sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.129693 env[1212]: time="2024-07-02T00:59:37.129637254Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdm7q,Uid:11698b24-20f9-48a6-a5bb-64a45c9c4b88,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.129907 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5-shm.mount: Deactivated successfully. Jul 2 00:59:37.131774 kubelet[2051]: E0702 00:59:37.131725 2051 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.132045 kubelet[2051]: E0702 00:59:37.131796 2051 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pdm7q" Jul 2 00:59:37.132045 kubelet[2051]: E0702 00:59:37.131818 2051 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pdm7q" Jul 2 00:59:37.132045 kubelet[2051]: E0702 00:59:37.131863 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-pdm7q_kube-system(11698b24-20f9-48a6-a5bb-64a45c9c4b88)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-pdm7q_kube-system(11698b24-20f9-48a6-a5bb-64a45c9c4b88)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdm7q" podUID="11698b24-20f9-48a6-a5bb-64a45c9c4b88" Jul 2 00:59:37.137287 env[1212]: time="2024-07-02T00:59:37.137222059Z" level=error msg="Failed to destroy network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.137772 env[1212]: time="2024-07-02T00:59:37.137732676Z" level=error msg="encountered an error cleaning up failed sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.137913 env[1212]: time="2024-07-02T00:59:37.137882281Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8d6774f6f-q8d79,Uid:271669f5-ff18-44c4-98a9-386c9abbddbc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.138254 kubelet[2051]: E0702 00:59:37.138217 2051 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.138373 kubelet[2051]: E0702 00:59:37.138273 2051 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" Jul 2 00:59:37.138373 kubelet[2051]: E0702 00:59:37.138295 2051 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" Jul 2 00:59:37.138373 kubelet[2051]: E0702 00:59:37.138329 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8d6774f6f-q8d79_calico-system(271669f5-ff18-44c4-98a9-386c9abbddbc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8d6774f6f-q8d79_calico-system(271669f5-ff18-44c4-98a9-386c9abbddbc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" podUID="271669f5-ff18-44c4-98a9-386c9abbddbc" Jul 2 00:59:37.405343 systemd[1]: Created slice kubepods-besteffort-pod2e1f0999_4b54_4a92_8804_3d78fb6e8151.slice. Jul 2 00:59:37.407621 env[1212]: time="2024-07-02T00:59:37.407567825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t7hk6,Uid:2e1f0999-4b54-4a92-8804-3d78fb6e8151,Namespace:calico-system,Attempt:0,}" Jul 2 00:59:37.434738 systemd[1]: Started sshd@7-10.0.0.115:22-10.0.0.1:60504.service. Jul 2 00:59:37.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.115:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:37.460525 env[1212]: time="2024-07-02T00:59:37.460471501Z" level=error msg="Failed to destroy network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.460847 env[1212]: time="2024-07-02T00:59:37.460815272Z" level=error msg="encountered an error cleaning up failed sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.460999 env[1212]: time="2024-07-02T00:59:37.460867673Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t7hk6,Uid:2e1f0999-4b54-4a92-8804-3d78fb6e8151,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.461117 kubelet[2051]: E0702 00:59:37.461080 2051 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.461206 kubelet[2051]: E0702 00:59:37.461137 2051 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:37.461206 kubelet[2051]: E0702 00:59:37.461160 2051 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t7hk6" Jul 2 00:59:37.461277 kubelet[2051]: E0702 00:59:37.461205 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t7hk6_calico-system(2e1f0999-4b54-4a92-8804-3d78fb6e8151)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t7hk6_calico-system(2e1f0999-4b54-4a92-8804-3d78fb6e8151)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:37.476000 audit[2866]: USER_ACCT pid=2866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.477668 sshd[2866]: Accepted publickey for core from 10.0.0.1 port 60504 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:37.477000 audit[2866]: CRED_ACQ pid=2866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.477000 audit[2866]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed7a7090 a2=3 a3=1 items=0 ppid=1 pid=2866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:37.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:37.478967 sshd[2866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:37.482260 systemd-logind[1201]: New session 8 of user core. Jul 2 00:59:37.483130 systemd[1]: Started session-8.scope. Jul 2 00:59:37.486000 audit[2866]: USER_START pid=2866 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.487000 audit[2893]: CRED_ACQ pid=2893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.499304 kubelet[2051]: I0702 00:59:37.498876 2051 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:37.500566 env[1212]: time="2024-07-02T00:59:37.499774335Z" level=info msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" Jul 2 00:59:37.502599 kubelet[2051]: E0702 00:59:37.502013 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:37.504043 env[1212]: time="2024-07-02T00:59:37.503776785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 00:59:37.505275 kubelet[2051]: I0702 00:59:37.505079 2051 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:37.507558 kubelet[2051]: I0702 00:59:37.507519 2051 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:37.508610 env[1212]: time="2024-07-02T00:59:37.508568380Z" level=info msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" Jul 2 00:59:37.510262 kubelet[2051]: I0702 00:59:37.510236 2051 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:37.516640 env[1212]: time="2024-07-02T00:59:37.515724372Z" level=info msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" Jul 2 00:59:37.516640 env[1212]: time="2024-07-02T00:59:37.516195867Z" level=info msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" Jul 2 00:59:37.553776 env[1212]: time="2024-07-02T00:59:37.553702363Z" level=error msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" failed" error="failed to destroy network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.555302 env[1212]: time="2024-07-02T00:59:37.555256774Z" level=error msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" failed" error="failed to destroy network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.557298 kubelet[2051]: E0702 00:59:37.557248 2051 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:37.557388 kubelet[2051]: E0702 00:59:37.557328 2051 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def"} Jul 2 00:59:37.557444 kubelet[2051]: E0702 00:59:37.557420 2051 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"271669f5-ff18-44c4-98a9-386c9abbddbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:59:37.557522 kubelet[2051]: E0702 00:59:37.557445 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"271669f5-ff18-44c4-98a9-386c9abbddbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" podUID="271669f5-ff18-44c4-98a9-386c9abbddbc" Jul 2 00:59:37.557522 kubelet[2051]: E0702 00:59:37.557254 2051 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:37.557522 kubelet[2051]: E0702 00:59:37.557488 2051 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5"} Jul 2 00:59:37.557522 kubelet[2051]: E0702 00:59:37.557509 2051 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"11698b24-20f9-48a6-a5bb-64a45c9c4b88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:59:37.557668 kubelet[2051]: E0702 00:59:37.557524 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"11698b24-20f9-48a6-a5bb-64a45c9c4b88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdm7q" podUID="11698b24-20f9-48a6-a5bb-64a45c9c4b88" Jul 2 00:59:37.560686 env[1212]: time="2024-07-02T00:59:37.560644869Z" level=error msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" failed" error="failed to destroy network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.561070 kubelet[2051]: E0702 00:59:37.560933 2051 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:37.561070 kubelet[2051]: E0702 00:59:37.560986 2051 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d"} Jul 2 00:59:37.561070 kubelet[2051]: E0702 00:59:37.561023 2051 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:59:37.561070 kubelet[2051]: E0702 00:59:37.561041 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2e1f0999-4b54-4a92-8804-3d78fb6e8151\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t7hk6" podUID="2e1f0999-4b54-4a92-8804-3d78fb6e8151" Jul 2 00:59:37.567860 env[1212]: time="2024-07-02T00:59:37.567791300Z" level=error msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" failed" error="failed to destroy network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:59:37.568207 kubelet[2051]: E0702 00:59:37.568077 2051 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:37.568207 kubelet[2051]: E0702 00:59:37.568112 2051 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0"} Jul 2 00:59:37.568207 kubelet[2051]: E0702 00:59:37.568136 2051 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:59:37.568207 kubelet[2051]: E0702 00:59:37.568157 2051 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bv7qs" podUID="1b25cfd0-b6c3-49e6-a63d-5a37c1451e86" Jul 2 00:59:37.622197 sshd[2866]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:37.628000 audit[2866]: USER_END pid=2866 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.628000 audit[2866]: CRED_DISP pid=2866 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:37.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.115:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:37.630880 systemd-logind[1201]: Session 8 logged out. Waiting for processes to exit. Jul 2 00:59:37.631059 systemd[1]: sshd@7-10.0.0.115:22-10.0.0.1:60504.service: Deactivated successfully. Jul 2 00:59:37.631768 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 00:59:37.632521 systemd-logind[1201]: Removed session 8. Jul 2 00:59:37.936706 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def-shm.mount: Deactivated successfully. Jul 2 00:59:41.937506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1362946358.mount: Deactivated successfully. Jul 2 00:59:42.149275 env[1212]: time="2024-07-02T00:59:42.149209808Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:42.150597 env[1212]: time="2024-07-02T00:59:42.150551125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:42.151857 env[1212]: time="2024-07-02T00:59:42.151827040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:42.153357 env[1212]: time="2024-07-02T00:59:42.153329201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:42.153818 env[1212]: time="2024-07-02T00:59:42.153787534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 00:59:42.165413 env[1212]: time="2024-07-02T00:59:42.163936091Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 00:59:42.177251 env[1212]: time="2024-07-02T00:59:42.177176653Z" level=info msg="CreateContainer within sandbox \"36a54bf28a8e94b9cc93b8245ec27352b3391153d6402511c15cb197a4ab0cbc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cc6be755b62dc00c71f96f76882a5540ec0f7c8039ebe3d2eda11663407bb17e\"" Jul 2 00:59:42.177727 env[1212]: time="2024-07-02T00:59:42.177698508Z" level=info msg="StartContainer for \"cc6be755b62dc00c71f96f76882a5540ec0f7c8039ebe3d2eda11663407bb17e\"" Jul 2 00:59:42.201304 systemd[1]: Started cri-containerd-cc6be755b62dc00c71f96f76882a5540ec0f7c8039ebe3d2eda11663407bb17e.scope. Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249805 kernel: kauditd_printk_skb: 45 callbacks suppressed Jul 2 00:59:42.249901 kernel: audit: type=1400 audit(1719881982.248:1014): avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2503 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.254314 kernel: audit: type=1300 audit(1719881982.248:1014): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2503 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.254383 kernel: audit: type=1327 audit(1719881982.248:1014): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366265373535623632646330306337316639366637363838326135 Jul 2 00:59:42.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366265373535623632646330306337316639366637363838326135 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.258612 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.258662 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.260488 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.264217 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.266632 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.266707 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.270711 kernel: audit: type=1400 audit(1719881982.248:1015): avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.248000 audit: BPF prog-id=133 op=LOAD Jul 2 00:59:42.248000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2503 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366265373535623632646330306337316639366637363838326135 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.249000 audit: BPF prog-id=134 op=LOAD Jul 2 00:59:42.249000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2503 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366265373535623632646330306337316639366637363838326135 Jul 2 00:59:42.251000 audit: BPF prog-id=134 op=UNLOAD Jul 2 00:59:42.251000 audit: BPF prog-id=133 op=UNLOAD Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:42.251000 audit: BPF prog-id=135 op=LOAD Jul 2 00:59:42.251000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2503 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366265373535623632646330306337316639366637363838326135 Jul 2 00:59:42.354951 env[1212]: time="2024-07-02T00:59:42.354898514Z" level=info msg="StartContainer for \"cc6be755b62dc00c71f96f76882a5540ec0f7c8039ebe3d2eda11663407bb17e\" returns successfully" Jul 2 00:59:42.445602 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 00:59:42.445738 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 00:59:42.523624 kubelet[2051]: E0702 00:59:42.523551 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:42.540248 kubelet[2051]: I0702 00:59:42.540178 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nxsbd" podStartSLOduration=1.233014191 podStartE2EDuration="13.54016158s" podCreationTimestamp="2024-07-02 00:59:29 +0000 UTC" firstStartedPulling="2024-07-02 00:59:29.847607691 +0000 UTC m=+21.523924797" lastFinishedPulling="2024-07-02 00:59:42.15475508 +0000 UTC m=+33.831072186" observedRunningTime="2024-07-02 00:59:42.538600337 +0000 UTC m=+34.214917443" watchObservedRunningTime="2024-07-02 00:59:42.54016158 +0000 UTC m=+34.216478686" Jul 2 00:59:42.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.115:22-10.0.0.1:56650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:42.624815 systemd[1]: Started sshd@8-10.0.0.115:22-10.0.0.1:56650.service. Jul 2 00:59:42.667961 sshd[3091]: Accepted publickey for core from 10.0.0.1 port 56650 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:42.667000 audit[3091]: USER_ACCT pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.668000 audit[3091]: CRED_ACQ pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.668000 audit[3091]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc04f830 a2=3 a3=1 items=0 ppid=1 pid=3091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:42.669418 sshd[3091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:42.673946 systemd-logind[1201]: New session 9 of user core. Jul 2 00:59:42.674420 systemd[1]: Started session-9.scope. Jul 2 00:59:42.678000 audit[3091]: USER_START pid=3091 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.680000 audit[3093]: CRED_ACQ pid=3093 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.829086 sshd[3091]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:42.829000 audit[3091]: USER_END pid=3091 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.829000 audit[3091]: CRED_DISP pid=3091 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:42.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.115:22-10.0.0.1:56650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:42.832349 systemd[1]: sshd@8-10.0.0.115:22-10.0.0.1:56650.service: Deactivated successfully. Jul 2 00:59:42.833120 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 00:59:42.833855 systemd-logind[1201]: Session 9 logged out. Waiting for processes to exit. Jul 2 00:59:42.834484 systemd-logind[1201]: Removed session 9. Jul 2 00:59:42.960355 kubelet[2051]: I0702 00:59:42.960315 2051 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:59:42.961190 kubelet[2051]: E0702 00:59:42.961056 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:42.988000 audit[3117]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:42.988000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffffdf6dd90 a2=0 a3=1 items=0 ppid=2214 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:42.989000 audit[3117]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:42.989000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=fffffdf6dd90 a2=0 a3=1 items=0 ppid=2214 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:42.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:43.525323 kubelet[2051]: E0702 00:59:43.524921 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:43.525323 kubelet[2051]: E0702 00:59:43.525149 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:43.739000 audit[3194]: AVC avc: denied { write } for pid=3194 comm="tee" name="fd" dev="proc" ino=18208 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.739000 audit[3194]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8d59a2a a2=241 a3=1b6 items=1 ppid=3155 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.739000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 00:59:43.739000 audit: PATH item=0 name="/dev/fd/63" inode=18205 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.740000 audit[3196]: AVC avc: denied { write } for pid=3196 comm="tee" name="fd" dev="proc" ino=18212 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.740000 audit[3196]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0deaa2b a2=241 a3=1b6 items=1 ppid=3160 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.740000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 00:59:43.740000 audit: PATH item=0 name="/dev/fd/63" inode=17324 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.740000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.748000 audit[3189]: AVC avc: denied { write } for pid=3189 comm="tee" name="fd" dev="proc" ino=17329 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.748000 audit[3189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbcf5a2a a2=241 a3=1b6 items=1 ppid=3151 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.748000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 00:59:43.748000 audit: PATH item=0 name="/dev/fd/63" inode=19344 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.748000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.755000 audit[3213]: AVC avc: denied { write } for pid=3213 comm="tee" name="fd" dev="proc" ino=19352 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.755000 audit[3213]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2ea6a2c a2=241 a3=1b6 items=1 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.755000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 00:59:43.755000 audit: PATH item=0 name="/dev/fd/63" inode=16193 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.755000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.764000 audit[3210]: AVC avc: denied { write } for pid=3210 comm="tee" name="fd" dev="proc" ino=17341 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.764000 audit[3210]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8350a2a a2=241 a3=1b6 items=1 ppid=3149 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.764000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 00:59:43.764000 audit: PATH item=0 name="/dev/fd/63" inode=19349 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.817000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=16207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.817000 audit[3226]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4e00a1b a2=241 a3=1b6 items=1 ppid=3184 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.817000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 00:59:43.817000 audit: PATH item=0 name="/dev/fd/63" inode=19354 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:43.821000 audit[3229]: AVC avc: denied { write } for pid=3229 comm="tee" name="fd" dev="proc" ino=16213 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:59:43.821000 audit[3229]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed9e4a1a a2=241 a3=1b6 items=1 ppid=3200 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:43.821000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 00:59:43.821000 audit: PATH item=0 name="/dev/fd/63" inode=18233 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:59:43.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:59:44.002480 systemd-networkd[1038]: vxlan.calico: Link UP Jul 2 00:59:44.002486 systemd-networkd[1038]: vxlan.calico: Gained carrier Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.021000 audit: BPF prog-id=136 op=LOAD Jul 2 00:59:44.021000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcb936958 a2=70 a3=ffffcb9369c8 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit: BPF prog-id=136 op=UNLOAD Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit: BPF prog-id=137 op=LOAD Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcb936958 a2=70 a3=4b243c items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit: BPF prog-id=137 op=UNLOAD Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcb936910 a2=70 a3=ffffcb936980 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit: BPF prog-id=138 op=LOAD Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffcb9368f8 a2=70 a3=ffffcb936968 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit: BPF prog-id=138 op=UNLOAD Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb9369c8 a2=70 a3=0 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb9369b8 a2=70 a3=0 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb936928 a2=70 a3=0 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcb936a00 a2=70 a3=b85048f items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcb936a00 a2=70 a3=b85048f items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.022000 audit: BPF prog-id=139 op=LOAD Jul 2 00:59:44.022000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcb936928 a2=70 a3=b8504a9 items=0 ppid=3152 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:59:44.028000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.028000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd7463a78 a2=70 a3=ffffd7463ae8 items=0 ppid=3152 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.028000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:59:44.028000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:44.028000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd7463948 a2=70 a3=ffffd74639b8 items=0 ppid=3152 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.028000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:59:44.035000 audit: BPF prog-id=139 op=UNLOAD Jul 2 00:59:44.077000 audit[3327]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:44.077000 audit[3327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffeb2aa1d0 a2=0 a3=ffff8db9ffa8 items=0 ppid=3152 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.077000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:44.084000 audit[3325]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3325 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:44.084000 audit[3325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd262a820 a2=0 a3=ffffb4dfdfa8 items=0 ppid=3152 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.084000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:44.085000 audit[3326]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3326 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:44.085000 audit[3326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc4c0c250 a2=0 a3=ffff9a5d9fa8 items=0 ppid=3152 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:44.086000 audit[3330]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:44.086000 audit[3330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc8f29180 a2=0 a3=ffffa0757fa8 items=0 ppid=3152 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:44.086000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:44.526341 kubelet[2051]: E0702 00:59:44.526305 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:45.585763 systemd-networkd[1038]: vxlan.calico: Gained IPv6LL Jul 2 00:59:47.834397 systemd[1]: Started sshd@9-10.0.0.115:22-10.0.0.1:56658.service. Jul 2 00:59:47.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:47.837525 kernel: kauditd_printk_skb: 174 callbacks suppressed Jul 2 00:59:47.837610 kernel: audit: type=1130 audit(1719881987.833:1058): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:47.877000 audit[3360]: USER_ACCT pid=3360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.878224 sshd[3360]: Accepted publickey for core from 10.0.0.1 port 56658 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:47.879819 sshd[3360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:47.878000 audit[3360]: CRED_ACQ pid=3360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.882647 kernel: audit: type=1101 audit(1719881987.877:1059): pid=3360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.882707 kernel: audit: type=1103 audit(1719881987.878:1060): pid=3360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.882730 kernel: audit: type=1006 audit(1719881987.878:1061): pid=3360 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 00:59:47.883732 systemd-logind[1201]: New session 10 of user core. Jul 2 00:59:47.878000 audit[3360]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8e2dba0 a2=3 a3=1 items=0 ppid=1 pid=3360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:47.884542 systemd[1]: Started session-10.scope. Jul 2 00:59:47.886373 kernel: audit: type=1300 audit(1719881987.878:1061): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8e2dba0 a2=3 a3=1 items=0 ppid=1 pid=3360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:47.878000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:47.887296 kernel: audit: type=1327 audit(1719881987.878:1061): proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:47.887000 audit[3360]: USER_START pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.888000 audit[3362]: CRED_ACQ pid=3362 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.892431 kernel: audit: type=1105 audit(1719881987.887:1062): pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:47.892487 kernel: audit: type=1103 audit(1719881987.888:1063): pid=3362 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.012967 sshd[3360]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:48.013000 audit[3360]: USER_END pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.016225 systemd[1]: sshd@9-10.0.0.115:22-10.0.0.1:56658.service: Deactivated successfully. Jul 2 00:59:48.013000 audit[3360]: CRED_DISP pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.018250 systemd[1]: Started sshd@10-10.0.0.115:22-10.0.0.1:56660.service. Jul 2 00:59:48.018707 kernel: audit: type=1106 audit(1719881988.013:1064): pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.018894 kernel: audit: type=1104 audit(1719881988.013:1065): pid=3360 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:48.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.115:22-10.0.0.1:56660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:48.019146 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 00:59:48.019883 systemd-logind[1201]: Session 10 logged out. Waiting for processes to exit. Jul 2 00:59:48.020908 systemd-logind[1201]: Removed session 10. Jul 2 00:59:48.058000 audit[3374]: USER_ACCT pid=3374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.059606 sshd[3374]: Accepted publickey for core from 10.0.0.1 port 56660 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:48.060000 audit[3374]: CRED_ACQ pid=3374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.060000 audit[3374]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd59cdcc0 a2=3 a3=1 items=0 ppid=1 pid=3374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:48.061142 sshd[3374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:48.064218 systemd-logind[1201]: New session 11 of user core. Jul 2 00:59:48.065769 systemd[1]: Started session-11.scope. Jul 2 00:59:48.068000 audit[3374]: USER_START pid=3374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.070000 audit[3376]: CRED_ACQ pid=3376 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.214548 sshd[3374]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:48.217000 audit[3374]: USER_END pid=3374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.217000 audit[3374]: CRED_DISP pid=3374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.220042 systemd[1]: Started sshd@11-10.0.0.115:22-10.0.0.1:56672.service. Jul 2 00:59:48.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.115:22-10.0.0.1:56672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:48.220563 systemd[1]: sshd@10-10.0.0.115:22-10.0.0.1:56660.service: Deactivated successfully. Jul 2 00:59:48.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.115:22-10.0.0.1:56660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:48.225282 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 00:59:48.230541 systemd-logind[1201]: Session 11 logged out. Waiting for processes to exit. Jul 2 00:59:48.233825 systemd-logind[1201]: Removed session 11. Jul 2 00:59:48.272000 audit[3385]: USER_ACCT pid=3385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.272800 sshd[3385]: Accepted publickey for core from 10.0.0.1 port 56672 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:48.273000 audit[3385]: CRED_ACQ pid=3385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.273000 audit[3385]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe227e710 a2=3 a3=1 items=0 ppid=1 pid=3385 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:48.274055 sshd[3385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:48.278079 systemd[1]: Started session-12.scope. Jul 2 00:59:48.278415 systemd-logind[1201]: New session 12 of user core. Jul 2 00:59:48.282000 audit[3385]: USER_START pid=3385 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.283000 audit[3388]: CRED_ACQ pid=3388 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.403097 env[1212]: time="2024-07-02T00:59:48.402759525Z" level=info msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" Jul 2 00:59:48.405328 sshd[3385]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:48.407000 audit[3385]: USER_END pid=3385 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.407000 audit[3385]: CRED_DISP pid=3385 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:48.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.115:22-10.0.0.1:56672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:48.410081 systemd[1]: sshd@11-10.0.0.115:22-10.0.0.1:56672.service: Deactivated successfully. Jul 2 00:59:48.411252 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 00:59:48.411627 systemd-logind[1201]: Session 12 logged out. Waiting for processes to exit. Jul 2 00:59:48.412342 systemd-logind[1201]: Removed session 12. Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.468 [INFO][3414] k8s.go 608: Cleaning up netns ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.469 [INFO][3414] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" iface="eth0" netns="/var/run/netns/cni-41557ec0-942c-e56f-d91c-564b2eacbfd3" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.469 [INFO][3414] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" iface="eth0" netns="/var/run/netns/cni-41557ec0-942c-e56f-d91c-564b2eacbfd3" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.470 [INFO][3414] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" iface="eth0" netns="/var/run/netns/cni-41557ec0-942c-e56f-d91c-564b2eacbfd3" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.470 [INFO][3414] k8s.go 615: Releasing IP address(es) ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.470 [INFO][3414] utils.go 188: Calico CNI releasing IP address ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.569 [INFO][3421] ipam_plugin.go 411: Releasing address using handleID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.569 [INFO][3421] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.569 [INFO][3421] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.581 [WARNING][3421] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.581 [INFO][3421] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.587 [INFO][3421] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:48.591299 env[1212]: 2024-07-02 00:59:48.589 [INFO][3414] k8s.go 621: Teardown processing complete. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 00:59:48.591920 env[1212]: time="2024-07-02T00:59:48.591454798Z" level=info msg="TearDown network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" successfully" Jul 2 00:59:48.591920 env[1212]: time="2024-07-02T00:59:48.591494639Z" level=info msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" returns successfully" Jul 2 00:59:48.592184 env[1212]: time="2024-07-02T00:59:48.592143854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t7hk6,Uid:2e1f0999-4b54-4a92-8804-3d78fb6e8151,Namespace:calico-system,Attempt:1,}" Jul 2 00:59:48.595030 systemd[1]: run-netns-cni\x2d41557ec0\x2d942c\x2de56f\x2dd91c\x2d564b2eacbfd3.mount: Deactivated successfully. Jul 2 00:59:48.720862 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:59:48.720971 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fae6221b9a: link becomes ready Jul 2 00:59:48.719756 systemd-networkd[1038]: cali4fae6221b9a: Link UP Jul 2 00:59:48.720945 systemd-networkd[1038]: cali4fae6221b9a: Gained carrier Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.644 [INFO][3431] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--t7hk6-eth0 csi-node-driver- calico-system 2e1f0999-4b54-4a92-8804-3d78fb6e8151 788 0 2024-07-02 00:59:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-t7hk6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali4fae6221b9a [] []}} ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.645 [INFO][3431] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.669 [INFO][3446] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" HandleID="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.682 [INFO][3446] ipam_plugin.go 264: Auto assigning IP ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" HandleID="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000129c80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-t7hk6", "timestamp":"2024-07-02 00:59:48.669945409 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.682 [INFO][3446] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.682 [INFO][3446] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.682 [INFO][3446] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.683 [INFO][3446] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.697 [INFO][3446] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.702 [INFO][3446] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.704 [INFO][3446] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.706 [INFO][3446] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.706 [INFO][3446] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.707 [INFO][3446] ipam.go 1685: Creating new handle: k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0 Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.710 [INFO][3446] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.715 [INFO][3446] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.715 [INFO][3446] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" host="localhost" Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.715 [INFO][3446] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:48.745298 env[1212]: 2024-07-02 00:59:48.715 [INFO][3446] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" HandleID="k8s-pod-network.b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.717 [INFO][3431] k8s.go 386: Populated endpoint ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t7hk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e1f0999-4b54-4a92-8804-3d78fb6e8151", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-t7hk6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4fae6221b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.718 [INFO][3431] k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.718 [INFO][3431] dataplane_linux.go 68: Setting the host side veth name to cali4fae6221b9a ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.721 [INFO][3431] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.722 [INFO][3431] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t7hk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e1f0999-4b54-4a92-8804-3d78fb6e8151", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0", Pod:"csi-node-driver-t7hk6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4fae6221b9a", MAC:"46:1f:fd:f6:a2:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:48.745883 env[1212]: 2024-07-02 00:59:48.743 [INFO][3431] k8s.go 500: Wrote updated endpoint to datastore ContainerID="b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0" Namespace="calico-system" Pod="csi-node-driver-t7hk6" WorkloadEndpoint="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 00:59:48.752000 audit[3469]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:48.752000 audit[3469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffda812290 a2=0 a3=ffff9574bfa8 items=0 ppid=3152 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.752000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:48.761294 env[1212]: time="2024-07-02T00:59:48.761222634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:48.761294 env[1212]: time="2024-07-02T00:59:48.761264995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:48.761294 env[1212]: time="2024-07-02T00:59:48.761283156Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:48.761457 env[1212]: time="2024-07-02T00:59:48.761425479Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0 pid=3477 runtime=io.containerd.runc.v2 Jul 2 00:59:48.773261 systemd[1]: Started cri-containerd-b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0.scope. Jul 2 00:59:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.804000 audit: BPF prog-id=140 op=LOAD Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3477 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313232363538336264393433663330343765343536633764336266 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3477 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313232363538336264393433663330343765343536633764336266 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit: BPF prog-id=141 op=LOAD Jul 2 00:59:48.805000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3477 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313232363538336264393433663330343765343536633764336266 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit: BPF prog-id=142 op=LOAD Jul 2 00:59:48.805000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3477 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313232363538336264393433663330343765343536633764336266 Jul 2 00:59:48.805000 audit: BPF prog-id=142 op=UNLOAD Jul 2 00:59:48.805000 audit: BPF prog-id=141 op=UNLOAD Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:48.805000 audit: BPF prog-id=143 op=LOAD Jul 2 00:59:48.805000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3477 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:48.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313232363538336264393433663330343765343536633764336266 Jul 2 00:59:48.806463 systemd-resolved[1152]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:59:48.815825 env[1212]: time="2024-07-02T00:59:48.815781013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t7hk6,Uid:2e1f0999-4b54-4a92-8804-3d78fb6e8151,Namespace:calico-system,Attempt:1,} returns sandbox id \"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0\"" Jul 2 00:59:48.817587 env[1212]: time="2024-07-02T00:59:48.817548534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 00:59:49.401297 env[1212]: time="2024-07-02T00:59:49.401245412Z" level=info msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] k8s.go 608: Cleaning up netns ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" iface="eth0" netns="/var/run/netns/cni-7b03f6ac-f109-f74c-0e29-d91589955148" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" iface="eth0" netns="/var/run/netns/cni-7b03f6ac-f109-f74c-0e29-d91589955148" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" iface="eth0" netns="/var/run/netns/cni-7b03f6ac-f109-f74c-0e29-d91589955148" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] k8s.go 615: Releasing IP address(es) ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.443 [INFO][3532] utils.go 188: Calico CNI releasing IP address ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.464 [INFO][3541] ipam_plugin.go 411: Releasing address using handleID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.464 [INFO][3541] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.464 [INFO][3541] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.472 [WARNING][3541] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.472 [INFO][3541] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.473 [INFO][3541] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:49.477585 env[1212]: 2024-07-02 00:59:49.475 [INFO][3532] k8s.go 621: Teardown processing complete. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 00:59:49.478519 env[1212]: time="2024-07-02T00:59:49.478484910Z" level=info msg="TearDown network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" successfully" Jul 2 00:59:49.478637 env[1212]: time="2024-07-02T00:59:49.478619873Z" level=info msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" returns successfully" Jul 2 00:59:49.479045 kubelet[2051]: E0702 00:59:49.479008 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:49.479797 env[1212]: time="2024-07-02T00:59:49.479771219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdm7q,Uid:11698b24-20f9-48a6-a5bb-64a45c9c4b88,Namespace:kube-system,Attempt:1,}" Jul 2 00:59:49.480367 systemd[1]: run-netns-cni\x2d7b03f6ac\x2df109\x2df74c\x2d0e29\x2dd91589955148.mount: Deactivated successfully. Jul 2 00:59:49.635172 systemd-networkd[1038]: cali2fcbed0d53d: Link UP Jul 2 00:59:49.636333 systemd-networkd[1038]: cali2fcbed0d53d: Gained carrier Jul 2 00:59:49.636640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2fcbed0d53d: link becomes ready Jul 2 00:59:49.657000 audit[3573]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:49.657000 audit[3573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffc0fc3970 a2=0 a3=ffffa6b0afa8 items=0 ppid=3152 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.553 [INFO][3549] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0 coredns-7db6d8ff4d- kube-system 11698b24-20f9-48a6-a5bb-64a45c9c4b88 798 0 2024-07-02 00:59:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-pdm7q eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2fcbed0d53d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.553 [INFO][3549] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.594 [INFO][3563] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" HandleID="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.608 [INFO][3563] ipam_plugin.go 264: Auto assigning IP ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" HandleID="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f8090), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-pdm7q", "timestamp":"2024-07-02 00:59:49.594967251 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.608 [INFO][3563] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.608 [INFO][3563] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.608 [INFO][3563] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.609 [INFO][3563] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.615 [INFO][3563] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.619 [INFO][3563] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.620 [INFO][3563] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.622 [INFO][3563] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.622 [INFO][3563] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.623 [INFO][3563] ipam.go 1685: Creating new handle: k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.626 [INFO][3563] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.631 [INFO][3563] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.631 [INFO][3563] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" host="localhost" Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.631 [INFO][3563] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:49.659299 env[1212]: 2024-07-02 00:59:49.631 [INFO][3563] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" HandleID="k8s-pod-network.500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.633 [INFO][3549] k8s.go 386: Populated endpoint ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"11698b24-20f9-48a6-a5bb-64a45c9c4b88", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-pdm7q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2fcbed0d53d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.633 [INFO][3549] k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.633 [INFO][3549] dataplane_linux.go 68: Setting the host side veth name to cali2fcbed0d53d ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.636 [INFO][3549] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.636 [INFO][3549] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"11698b24-20f9-48a6-a5bb-64a45c9c4b88", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c", Pod:"coredns-7db6d8ff4d-pdm7q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2fcbed0d53d", MAC:"72:17:f9:89:98:52", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:49.660201 env[1212]: 2024-07-02 00:59:49.645 [INFO][3549] k8s.go 500: Wrote updated endpoint to datastore ContainerID="500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdm7q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 00:59:49.664700 env[1212]: time="2024-07-02T00:59:49.664663339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:49.667952 env[1212]: time="2024-07-02T00:59:49.667911292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:49.669444 env[1212]: time="2024-07-02T00:59:49.669415526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:49.670941 env[1212]: time="2024-07-02T00:59:49.670900040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:49.671277 env[1212]: time="2024-07-02T00:59:49.671236287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 00:59:49.674643 env[1212]: time="2024-07-02T00:59:49.672504236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:49.674643 env[1212]: time="2024-07-02T00:59:49.672542917Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:49.674643 env[1212]: time="2024-07-02T00:59:49.672553037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:49.674643 env[1212]: time="2024-07-02T00:59:49.672742561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c pid=3591 runtime=io.containerd.runc.v2 Jul 2 00:59:49.678982 env[1212]: time="2024-07-02T00:59:49.678932860Z" level=info msg="CreateContainer within sandbox \"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 00:59:49.691302 systemd[1]: Started cri-containerd-500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c.scope. Jul 2 00:59:49.695559 env[1212]: time="2024-07-02T00:59:49.695520914Z" level=info msg="CreateContainer within sandbox \"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5c07829d9fe7bbcb0c03bc44ddec3578f420970211095ff6ad4a7781b5d4c21d\"" Jul 2 00:59:49.698987 env[1212]: time="2024-07-02T00:59:49.696241330Z" level=info msg="StartContainer for \"5c07829d9fe7bbcb0c03bc44ddec3578f420970211095ff6ad4a7781b5d4c21d\"" Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit: BPF prog-id=144 op=LOAD Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3591 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306561323332663935343666666662633539653461366538353834 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3591 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306561323332663935343666666662633539653461366538353834 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.715000 audit: BPF prog-id=145 op=LOAD Jul 2 00:59:49.715000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3591 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306561323332663935343666666662633539653461366538353834 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit: BPF prog-id=146 op=LOAD Jul 2 00:59:49.716000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3591 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306561323332663935343666666662633539653461366538353834 Jul 2 00:59:49.716000 audit: BPF prog-id=146 op=UNLOAD Jul 2 00:59:49.716000 audit: BPF prog-id=145 op=UNLOAD Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.716000 audit: BPF prog-id=147 op=LOAD Jul 2 00:59:49.716000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3591 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306561323332663935343666666662633539653461366538353834 Jul 2 00:59:49.719250 systemd[1]: Started cri-containerd-5c07829d9fe7bbcb0c03bc44ddec3578f420970211095ff6ad4a7781b5d4c21d.scope. Jul 2 00:59:49.722994 systemd-resolved[1152]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:59:49.750225 env[1212]: time="2024-07-02T00:59:49.750187984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdm7q,Uid:11698b24-20f9-48a6-a5bb-64a45c9c4b88,Namespace:kube-system,Attempt:1,} returns sandbox id \"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c\"" Jul 2 00:59:49.750775 kubelet[2051]: E0702 00:59:49.750753 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:49.752892 env[1212]: time="2024-07-02T00:59:49.752854604Z" level=info msg="CreateContainer within sandbox \"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3477 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303738323964396665376262636230633033626334346464656333 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit: BPF prog-id=148 op=LOAD Jul 2 00:59:49.760000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3477 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303738323964396665376262636230633033626334346464656333 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.760000 audit: BPF prog-id=149 op=LOAD Jul 2 00:59:49.760000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3477 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303738323964396665376262636230633033626334346464656333 Jul 2 00:59:49.761000 audit: BPF prog-id=149 op=UNLOAD Jul 2 00:59:49.761000 audit: BPF prog-id=148 op=UNLOAD Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.761000 audit: BPF prog-id=150 op=LOAD Jul 2 00:59:49.761000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3477 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303738323964396665376262636230633033626334346464656333 Jul 2 00:59:49.772276 env[1212]: time="2024-07-02T00:59:49.771392581Z" level=info msg="CreateContainer within sandbox \"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"83a07346dd3cda1d80ea346f6175ed63d5773ca7c82c580d9f3cae0c70e904ee\"" Jul 2 00:59:49.772276 env[1212]: time="2024-07-02T00:59:49.771991315Z" level=info msg="StartContainer for \"83a07346dd3cda1d80ea346f6175ed63d5773ca7c82c580d9f3cae0c70e904ee\"" Jul 2 00:59:49.779165 env[1212]: time="2024-07-02T00:59:49.772321642Z" level=info msg="StartContainer for \"5c07829d9fe7bbcb0c03bc44ddec3578f420970211095ff6ad4a7781b5d4c21d\" returns successfully" Jul 2 00:59:49.779165 env[1212]: time="2024-07-02T00:59:49.775963204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 00:59:49.789116 systemd[1]: Started cri-containerd-83a07346dd3cda1d80ea346f6175ed63d5773ca7c82c580d9f3cae0c70e904ee.scope. Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.810000 audit: BPF prog-id=151 op=LOAD Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3591 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613037333436646433636461316438306561333436663631373565 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3591 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613037333436646433636461316438306561333436663631373565 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit: BPF prog-id=152 op=LOAD Jul 2 00:59:49.811000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3591 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613037333436646433636461316438306561333436663631373565 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit: BPF prog-id=153 op=LOAD Jul 2 00:59:49.811000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3591 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613037333436646433636461316438306561333436663631373565 Jul 2 00:59:49.811000 audit: BPF prog-id=153 op=UNLOAD Jul 2 00:59:49.811000 audit: BPF prog-id=152 op=UNLOAD Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:49.811000 audit: BPF prog-id=154 op=LOAD Jul 2 00:59:49.811000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3591 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:49.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613037333436646433636461316438306561333436663631373565 Jul 2 00:59:49.822433 env[1212]: time="2024-07-02T00:59:49.822391929Z" level=info msg="StartContainer for \"83a07346dd3cda1d80ea346f6175ed63d5773ca7c82c580d9f3cae0c70e904ee\" returns successfully" Jul 2 00:59:50.385788 systemd-networkd[1038]: cali4fae6221b9a: Gained IPv6LL Jul 2 00:59:50.401687 env[1212]: time="2024-07-02T00:59:50.401293383Z" level=info msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.443 [INFO][3714] k8s.go 608: Cleaning up netns ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.443 [INFO][3714] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" iface="eth0" netns="/var/run/netns/cni-7c509ab7-d05e-869d-a8e5-2f4711a820f0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.444 [INFO][3714] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" iface="eth0" netns="/var/run/netns/cni-7c509ab7-d05e-869d-a8e5-2f4711a820f0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.444 [INFO][3714] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" iface="eth0" netns="/var/run/netns/cni-7c509ab7-d05e-869d-a8e5-2f4711a820f0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.444 [INFO][3714] k8s.go 615: Releasing IP address(es) ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.444 [INFO][3714] utils.go 188: Calico CNI releasing IP address ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.462 [INFO][3722] ipam_plugin.go 411: Releasing address using handleID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.462 [INFO][3722] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.462 [INFO][3722] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.470 [WARNING][3722] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.470 [INFO][3722] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.472 [INFO][3722] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:50.484375 env[1212]: 2024-07-02 00:59:50.477 [INFO][3714] k8s.go 621: Teardown processing complete. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 00:59:50.485120 env[1212]: time="2024-07-02T00:59:50.484511771Z" level=info msg="TearDown network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" successfully" Jul 2 00:59:50.485120 env[1212]: time="2024-07-02T00:59:50.484542892Z" level=info msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" returns successfully" Jul 2 00:59:50.485465 env[1212]: time="2024-07-02T00:59:50.485423351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8d6774f6f-q8d79,Uid:271669f5-ff18-44c4-98a9-386c9abbddbc,Namespace:calico-system,Attempt:1,}" Jul 2 00:59:50.546400 kubelet[2051]: E0702 00:59:50.546364 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:50.565518 kubelet[2051]: I0702 00:59:50.565229 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-pdm7q" podStartSLOduration=27.565212665 podStartE2EDuration="27.565212665s" podCreationTimestamp="2024-07-02 00:59:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:50.55772882 +0000 UTC m=+42.234045926" watchObservedRunningTime="2024-07-02 00:59:50.565212665 +0000 UTC m=+42.241529771" Jul 2 00:59:50.568000 audit[3745]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:50.568000 audit[3745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdef16170 a2=0 a3=1 items=0 ppid=2214 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:50.568000 audit[3745]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:50.568000 audit[3745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffdef16170 a2=0 a3=1 items=0 ppid=2214 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:50.588000 audit[3752]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:50.588000 audit[3752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc25246c0 a2=0 a3=1 items=0 ppid=2214 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:50.597116 systemd[1]: run-netns-cni\x2d7c509ab7\x2dd05e\x2d869d\x2da8e5\x2d2f4711a820f0.mount: Deactivated successfully. Jul 2 00:59:50.589000 audit[3752]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:50.589000 audit[3752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc25246c0 a2=0 a3=1 items=0 ppid=2214 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:50.649854 systemd-networkd[1038]: calif4dec6e586b: Link UP Jul 2 00:59:50.650595 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:59:50.650638 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif4dec6e586b: link becomes ready Jul 2 00:59:50.651152 systemd-networkd[1038]: calif4dec6e586b: Gained carrier Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.560 [INFO][3730] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0 calico-kube-controllers-8d6774f6f- calico-system 271669f5-ff18-44c4-98a9-386c9abbddbc 814 0 2024-07-02 00:59:29 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8d6774f6f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-8d6774f6f-q8d79 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif4dec6e586b [] []}} ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.560 [INFO][3730] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.610 [INFO][3747] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" HandleID="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.621 [INFO][3747] ipam_plugin.go 264: Auto assigning IP ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" HandleID="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000364fa0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-8d6774f6f-q8d79", "timestamp":"2024-07-02 00:59:50.610800906 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.621 [INFO][3747] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.621 [INFO][3747] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.621 [INFO][3747] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.623 [INFO][3747] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.626 [INFO][3747] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.630 [INFO][3747] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.632 [INFO][3747] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.634 [INFO][3747] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.634 [INFO][3747] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.635 [INFO][3747] ipam.go 1685: Creating new handle: k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260 Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.638 [INFO][3747] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.643 [INFO][3747] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.644 [INFO][3747] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" host="localhost" Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.644 [INFO][3747] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:50.664118 env[1212]: 2024-07-02 00:59:50.644 [INFO][3747] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" HandleID="k8s-pod-network.467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.646 [INFO][3730] k8s.go 386: Populated endpoint ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0", GenerateName:"calico-kube-controllers-8d6774f6f-", Namespace:"calico-system", SelfLink:"", UID:"271669f5-ff18-44c4-98a9-386c9abbddbc", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8d6774f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-8d6774f6f-q8d79", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif4dec6e586b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.646 [INFO][3730] k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.646 [INFO][3730] dataplane_linux.go 68: Setting the host side veth name to calif4dec6e586b ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.651 [INFO][3730] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.651 [INFO][3730] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0", GenerateName:"calico-kube-controllers-8d6774f6f-", Namespace:"calico-system", SelfLink:"", UID:"271669f5-ff18-44c4-98a9-386c9abbddbc", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8d6774f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260", Pod:"calico-kube-controllers-8d6774f6f-q8d79", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif4dec6e586b", MAC:"a6:6a:b7:f5:dd:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:50.664707 env[1212]: 2024-07-02 00:59:50.658 [INFO][3730] k8s.go 500: Wrote updated endpoint to datastore ContainerID="467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260" Namespace="calico-system" Pod="calico-kube-controllers-8d6774f6f-q8d79" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 00:59:50.671000 audit[3770]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:50.671000 audit[3770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffc0312f80 a2=0 a3=ffffab219fa8 items=0 ppid=3152 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.671000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:50.677008 env[1212]: time="2024-07-02T00:59:50.676926719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:50.677008 env[1212]: time="2024-07-02T00:59:50.676971640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:50.677161 env[1212]: time="2024-07-02T00:59:50.676981400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:50.677372 env[1212]: time="2024-07-02T00:59:50.677336128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260 pid=3780 runtime=io.containerd.runc.v2 Jul 2 00:59:50.690760 systemd[1]: Started cri-containerd-467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260.scope. Jul 2 00:59:50.698430 systemd[1]: run-containerd-runc-k8s.io-467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260-runc.uXcfcL.mount: Deactivated successfully. Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.727000 audit: BPF prog-id=155 op=LOAD Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436376363623432623664303963386630343037313338363734366466 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436376363623432623664303963386630343037313338363734366466 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit: BPF prog-id=156 op=LOAD Jul 2 00:59:50.728000 audit[3788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436376363623432623664303963386630343037313338363734366466 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit: BPF prog-id=157 op=LOAD Jul 2 00:59:50.728000 audit[3788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436376363623432623664303963386630343037313338363734366466 Jul 2 00:59:50.728000 audit: BPF prog-id=157 op=UNLOAD Jul 2 00:59:50.728000 audit: BPF prog-id=156 op=UNLOAD Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.728000 audit: BPF prog-id=158 op=LOAD Jul 2 00:59:50.728000 audit[3788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436376363623432623664303963386630343037313338363734366466 Jul 2 00:59:50.730401 env[1212]: time="2024-07-02T00:59:50.727815877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:50.730401 env[1212]: time="2024-07-02T00:59:50.729979525Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:50.729974 systemd-resolved[1152]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:59:50.731901 env[1212]: time="2024-07-02T00:59:50.731863486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:50.733823 env[1212]: time="2024-07-02T00:59:50.733780888Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:50.734074 env[1212]: time="2024-07-02T00:59:50.734037894Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 00:59:50.736638 env[1212]: time="2024-07-02T00:59:50.736591190Z" level=info msg="CreateContainer within sandbox \"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 00:59:50.752294 env[1212]: time="2024-07-02T00:59:50.752242094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8d6774f6f-q8d79,Uid:271669f5-ff18-44c4-98a9-386c9abbddbc,Namespace:calico-system,Attempt:1,} returns sandbox id \"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260\"" Jul 2 00:59:50.754376 env[1212]: time="2024-07-02T00:59:50.754134456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 00:59:50.782582 env[1212]: time="2024-07-02T00:59:50.782525399Z" level=info msg="CreateContainer within sandbox \"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"eea075b2425bb5ab0763922b609c29dc7b92761aab293d34080afc56a088ab27\"" Jul 2 00:59:50.783068 env[1212]: time="2024-07-02T00:59:50.783025770Z" level=info msg="StartContainer for \"eea075b2425bb5ab0763922b609c29dc7b92761aab293d34080afc56a088ab27\"" Jul 2 00:59:50.798992 systemd[1]: Started cri-containerd-eea075b2425bb5ab0763922b609c29dc7b92761aab293d34080afc56a088ab27.scope. Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3477 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565613037356232343235626235616230373633393232623630396332 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit: BPF prog-id=159 op=LOAD Jul 2 00:59:50.821000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3477 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565613037356232343235626235616230373633393232623630396332 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit: BPF prog-id=160 op=LOAD Jul 2 00:59:50.821000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3477 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565613037356232343235626235616230373633393232623630396332 Jul 2 00:59:50.821000 audit: BPF prog-id=160 op=UNLOAD Jul 2 00:59:50.821000 audit: BPF prog-id=159 op=UNLOAD Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:50.821000 audit: BPF prog-id=161 op=LOAD Jul 2 00:59:50.821000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3477 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:50.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565613037356232343235626235616230373633393232623630396332 Jul 2 00:59:50.837783 env[1212]: time="2024-07-02T00:59:50.837731932Z" level=info msg="StartContainer for \"eea075b2425bb5ab0763922b609c29dc7b92761aab293d34080afc56a088ab27\" returns successfully" Jul 2 00:59:50.897935 systemd-networkd[1038]: cali2fcbed0d53d: Gained IPv6LL Jul 2 00:59:51.487587 kubelet[2051]: I0702 00:59:51.487540 2051 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 00:59:51.487775 kubelet[2051]: I0702 00:59:51.487605 2051 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 00:59:51.551570 kubelet[2051]: E0702 00:59:51.551536 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:51.561674 kubelet[2051]: I0702 00:59:51.561612 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-t7hk6" podStartSLOduration=20.643540043 podStartE2EDuration="22.561594678s" podCreationTimestamp="2024-07-02 00:59:29 +0000 UTC" firstStartedPulling="2024-07-02 00:59:48.817050042 +0000 UTC m=+40.493367148" lastFinishedPulling="2024-07-02 00:59:50.735104677 +0000 UTC m=+42.411421783" observedRunningTime="2024-07-02 00:59:51.559866521 +0000 UTC m=+43.236183627" watchObservedRunningTime="2024-07-02 00:59:51.561594678 +0000 UTC m=+43.237911784" Jul 2 00:59:51.923492 systemd-networkd[1038]: calif4dec6e586b: Gained IPv6LL Jul 2 00:59:52.405903 env[1212]: time="2024-07-02T00:59:52.405488693Z" level=info msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] k8s.go 608: Cleaning up netns ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" iface="eth0" netns="/var/run/netns/cni-4dcc16d3-43aa-77d0-9ef0-fcf2a8dee379" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" iface="eth0" netns="/var/run/netns/cni-4dcc16d3-43aa-77d0-9ef0-fcf2a8dee379" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" iface="eth0" netns="/var/run/netns/cni-4dcc16d3-43aa-77d0-9ef0-fcf2a8dee379" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] k8s.go 615: Releasing IP address(es) ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.461 [INFO][3873] utils.go 188: Calico CNI releasing IP address ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.490 [INFO][3881] ipam_plugin.go 411: Releasing address using handleID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.490 [INFO][3881] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.490 [INFO][3881] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.498 [WARNING][3881] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.498 [INFO][3881] ipam_plugin.go 439: Releasing address using workloadID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.500 [INFO][3881] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:52.503288 env[1212]: 2024-07-02 00:59:52.501 [INFO][3873] k8s.go 621: Teardown processing complete. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 00:59:52.505496 systemd[1]: run-netns-cni\x2d4dcc16d3\x2d43aa\x2d77d0\x2d9ef0\x2dfcf2a8dee379.mount: Deactivated successfully. Jul 2 00:59:52.506274 env[1212]: time="2024-07-02T00:59:52.506231689Z" level=info msg="TearDown network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" successfully" Jul 2 00:59:52.506329 env[1212]: time="2024-07-02T00:59:52.506272410Z" level=info msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" returns successfully" Jul 2 00:59:52.507080 kubelet[2051]: E0702 00:59:52.506718 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:52.507188 env[1212]: time="2024-07-02T00:59:52.507047146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bv7qs,Uid:1b25cfd0-b6c3-49e6-a63d-5a37c1451e86,Namespace:kube-system,Attempt:1,}" Jul 2 00:59:52.654889 systemd-networkd[1038]: cali8e604cde512: Link UP Jul 2 00:59:52.655588 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:59:52.655669 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8e604cde512: link becomes ready Jul 2 00:59:52.656408 systemd-networkd[1038]: cali8e604cde512: Gained carrier Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.587 [INFO][3889] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0 coredns-7db6d8ff4d- kube-system 1b25cfd0-b6c3-49e6-a63d-5a37c1451e86 853 0 2024-07-02 00:59:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-bv7qs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8e604cde512 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.587 [INFO][3889] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.615 [INFO][3904] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" HandleID="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.625 [INFO][3904] ipam_plugin.go 264: Auto assigning IP ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" HandleID="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027d0b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-bv7qs", "timestamp":"2024-07-02 00:59:52.615364702 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.625 [INFO][3904] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.626 [INFO][3904] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.626 [INFO][3904] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.627 [INFO][3904] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.630 [INFO][3904] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.636 [INFO][3904] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.637 [INFO][3904] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.639 [INFO][3904] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.639 [INFO][3904] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.640 [INFO][3904] ipam.go 1685: Creating new handle: k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5 Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.643 [INFO][3904] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.648 [INFO][3904] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.648 [INFO][3904] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" host="localhost" Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.648 [INFO][3904] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:59:52.668276 env[1212]: 2024-07-02 00:59:52.648 [INFO][3904] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" HandleID="k8s-pod-network.a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.650 [INFO][3889] k8s.go 386: Populated endpoint ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-bv7qs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e604cde512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.650 [INFO][3889] k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.650 [INFO][3889] dataplane_linux.go 68: Setting the host side veth name to cali8e604cde512 ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.656 [INFO][3889] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.657 [INFO][3889] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5", Pod:"coredns-7db6d8ff4d-bv7qs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e604cde512", MAC:"a6:4e:5e:02:c1:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:59:52.668862 env[1212]: 2024-07-02 00:59:52.666 [INFO][3889] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bv7qs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 00:59:52.671000 audit[3922]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3922 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:59:52.671000 audit[3922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffdb3c8fb0 a2=0 a3=ffff937bbfa8 items=0 ppid=3152 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.671000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:59:52.681520 env[1212]: time="2024-07-02T00:59:52.681433290Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:59:52.681520 env[1212]: time="2024-07-02T00:59:52.681487771Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:59:52.681520 env[1212]: time="2024-07-02T00:59:52.681498011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:59:52.681879 env[1212]: time="2024-07-02T00:59:52.681662135Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5 pid=3937 runtime=io.containerd.runc.v2 Jul 2 00:59:52.702228 systemd[1]: run-containerd-runc-k8s.io-a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5-runc.XIF42X.mount: Deactivated successfully. Jul 2 00:59:52.704178 systemd[1]: Started cri-containerd-a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5.scope. Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.728000 audit: BPF prog-id=162 op=LOAD Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3937 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356136333364376236353438643335313433303031666536636439 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3937 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356136333364376236353438643335313433303031666536636439 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit: BPF prog-id=163 op=LOAD Jul 2 00:59:52.729000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3937 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356136333364376236353438643335313433303031666536636439 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit: BPF prog-id=164 op=LOAD Jul 2 00:59:52.729000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3937 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356136333364376236353438643335313433303031666536636439 Jul 2 00:59:52.729000 audit: BPF prog-id=164 op=UNLOAD Jul 2 00:59:52.729000 audit: BPF prog-id=163 op=UNLOAD Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.729000 audit: BPF prog-id=165 op=LOAD Jul 2 00:59:52.729000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3937 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356136333364376236353438643335313433303031666536636439 Jul 2 00:59:52.732045 systemd-resolved[1152]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:59:52.747454 env[1212]: time="2024-07-02T00:59:52.747413036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bv7qs,Uid:1b25cfd0-b6c3-49e6-a63d-5a37c1451e86,Namespace:kube-system,Attempt:1,} returns sandbox id \"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5\"" Jul 2 00:59:52.748836 kubelet[2051]: E0702 00:59:52.748269 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:52.749089 env[1212]: time="2024-07-02T00:59:52.748426258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:52.750737 env[1212]: time="2024-07-02T00:59:52.750707345Z" level=info msg="CreateContainer within sandbox \"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:59:52.752404 env[1212]: time="2024-07-02T00:59:52.751928891Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:52.755892 env[1212]: time="2024-07-02T00:59:52.755857294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:52.757770 env[1212]: time="2024-07-02T00:59:52.757707373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:59:52.758426 env[1212]: time="2024-07-02T00:59:52.758386987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1\"" Jul 2 00:59:52.764591 env[1212]: time="2024-07-02T00:59:52.764546596Z" level=info msg="CreateContainer within sandbox \"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0477e15f69c25455fd03ff414c0fde55c34821c70208df62168dec469e95b951\"" Jul 2 00:59:52.766277 env[1212]: time="2024-07-02T00:59:52.766248312Z" level=info msg="StartContainer for \"0477e15f69c25455fd03ff414c0fde55c34821c70208df62168dec469e95b951\"" Jul 2 00:59:52.770220 env[1212]: time="2024-07-02T00:59:52.770190395Z" level=info msg="CreateContainer within sandbox \"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 00:59:52.781537 env[1212]: time="2024-07-02T00:59:52.781485512Z" level=info msg="CreateContainer within sandbox \"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d\"" Jul 2 00:59:52.783832 systemd[1]: Started cri-containerd-0477e15f69c25455fd03ff414c0fde55c34821c70208df62168dec469e95b951.scope. Jul 2 00:59:52.784859 env[1212]: time="2024-07-02T00:59:52.784310851Z" level=info msg="StartContainer for \"2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d\"" Jul 2 00:59:52.802420 systemd[1]: Started cri-containerd-2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d.scope. Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit: BPF prog-id=166 op=LOAD Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3937 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373765313566363963323534353566643033666634313463306664 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3937 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373765313566363963323534353566643033666634313463306664 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit: BPF prog-id=167 op=LOAD Jul 2 00:59:52.808000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3937 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373765313566363963323534353566643033666634313463306664 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit: BPF prog-id=168 op=LOAD Jul 2 00:59:52.808000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3937 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373765313566363963323534353566643033666634313463306664 Jul 2 00:59:52.808000 audit: BPF prog-id=168 op=UNLOAD Jul 2 00:59:52.808000 audit: BPF prog-id=167 op=UNLOAD Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.808000 audit: BPF prog-id=169 op=LOAD Jul 2 00:59:52.808000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3937 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373765313566363963323534353566643033666634313463306664 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.830000 audit: BPF prog-id=170 op=LOAD Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3780 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266396361386463373339323863323937366134666637636134313732 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3780 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266396361386463373339323863323937366134666637636134313732 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit: BPF prog-id=171 op=LOAD Jul 2 00:59:52.831000 audit[4001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3780 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266396361386463373339323863323937366134666637636134313732 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit: BPF prog-id=172 op=LOAD Jul 2 00:59:52.831000 audit[4001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3780 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266396361386463373339323863323937366134666637636134313732 Jul 2 00:59:52.831000 audit: BPF prog-id=172 op=UNLOAD Jul 2 00:59:52.831000 audit: BPF prog-id=171 op=UNLOAD Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { perfmon } for pid=4001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit[4001]: AVC avc: denied { bpf } for pid=4001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:59:52.831000 audit: BPF prog-id=173 op=LOAD Jul 2 00:59:52.831000 audit[4001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3780 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266396361386463373339323863323937366134666637636134313732 Jul 2 00:59:52.840319 env[1212]: time="2024-07-02T00:59:52.840284267Z" level=info msg="StartContainer for \"0477e15f69c25455fd03ff414c0fde55c34821c70208df62168dec469e95b951\" returns successfully" Jul 2 00:59:52.871551 env[1212]: time="2024-07-02T00:59:52.871508763Z" level=info msg="StartContainer for \"2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d\" returns successfully" Jul 2 00:59:53.409999 systemd[1]: Started sshd@12-10.0.0.115:22-10.0.0.1:39682.service. Jul 2 00:59:53.411232 kernel: kauditd_printk_skb: 532 callbacks suppressed Jul 2 00:59:53.411352 kernel: audit: type=1130 audit(1719881993.408:1231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.115:22-10.0.0.1:39682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:53.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.115:22-10.0.0.1:39682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:53.453000 audit[4048]: USER_ACCT pid=4048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.455852 sshd[4048]: Accepted publickey for core from 10.0.0.1 port 39682 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:53.457394 sshd[4048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:53.455000 audit[4048]: CRED_ACQ pid=4048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.460156 kernel: audit: type=1101 audit(1719881993.453:1232): pid=4048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.460212 kernel: audit: type=1103 audit(1719881993.455:1233): pid=4048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.460247 kernel: audit: type=1006 audit(1719881993.455:1234): pid=4048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 00:59:53.455000 audit[4048]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5f3f900 a2=3 a3=1 items=0 ppid=1 pid=4048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.461652 systemd-logind[1201]: New session 13 of user core. Jul 2 00:59:53.462693 systemd[1]: Started session-13.scope. Jul 2 00:59:53.464011 kernel: audit: type=1300 audit(1719881993.455:1234): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5f3f900 a2=3 a3=1 items=0 ppid=1 pid=4048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:53.464946 kernel: audit: type=1327 audit(1719881993.455:1234): proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:53.464000 audit[4048]: USER_START pid=4048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.465000 audit[4050]: CRED_ACQ pid=4050 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.471160 kernel: audit: type=1105 audit(1719881993.464:1235): pid=4048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.471195 kernel: audit: type=1103 audit(1719881993.465:1236): pid=4050 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.556608 kubelet[2051]: E0702 00:59:53.556560 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:53.578801 kubelet[2051]: I0702 00:59:53.578750 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8d6774f6f-q8d79" podStartSLOduration=22.573055807 podStartE2EDuration="24.578734929s" podCreationTimestamp="2024-07-02 00:59:29 +0000 UTC" firstStartedPulling="2024-07-02 00:59:50.753803288 +0000 UTC m=+42.430120354" lastFinishedPulling="2024-07-02 00:59:52.75948241 +0000 UTC m=+44.435799476" observedRunningTime="2024-07-02 00:59:53.578465884 +0000 UTC m=+45.254782950" watchObservedRunningTime="2024-07-02 00:59:53.578734929 +0000 UTC m=+45.255052035" Jul 2 00:59:53.579406 kubelet[2051]: I0702 00:59:53.579361 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-bv7qs" podStartSLOduration=30.579352022 podStartE2EDuration="30.579352022s" podCreationTimestamp="2024-07-02 00:59:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:59:53.566297153 +0000 UTC m=+45.242614259" watchObservedRunningTime="2024-07-02 00:59:53.579352022 +0000 UTC m=+45.255669128" Jul 2 00:59:53.586217 kernel: audit: type=1325 audit(1719881993.580:1237): table=filter:109 family=2 entries=8 op=nft_register_rule pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:53.586281 kernel: audit: type=1300 audit(1719881993.580:1237): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc2019050 a2=0 a3=1 items=0 ppid=2214 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.580000 audit[4060]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:53.580000 audit[4060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc2019050 a2=0 a3=1 items=0 ppid=2214 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:53.580000 audit[4060]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:53.580000 audit[4060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc2019050 a2=0 a3=1 items=0 ppid=2214 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:53.601000 audit[4064]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:53.601000 audit[4064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffeb73c140 a2=0 a3=1 items=0 ppid=2214 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:53.612000 audit[4064]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:59:53.612000 audit[4064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffeb73c140 a2=0 a3=1 items=0 ppid=2214 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:53.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:59:53.649681 sshd[4048]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:53.648000 audit[4048]: USER_END pid=4048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.649000 audit[4048]: CRED_DISP pid=4048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:53.652115 systemd[1]: sshd@12-10.0.0.115:22-10.0.0.1:39682.service: Deactivated successfully. Jul 2 00:59:53.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.115:22-10.0.0.1:39682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:53.652883 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 00:59:53.653345 systemd-logind[1201]: Session 13 logged out. Waiting for processes to exit. Jul 2 00:59:53.653993 systemd-logind[1201]: Removed session 13. Jul 2 00:59:54.565486 kubelet[2051]: I0702 00:59:54.565445 2051 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:59:54.566485 kubelet[2051]: E0702 00:59:54.566460 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:54.674070 systemd-networkd[1038]: cali8e604cde512: Gained IPv6LL Jul 2 00:59:55.567602 kubelet[2051]: E0702 00:59:55.567544 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:59:58.654143 systemd[1]: Started sshd@13-10.0.0.115:22-10.0.0.1:39692.service. Jul 2 00:59:58.657051 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 00:59:58.657170 kernel: audit: type=1130 audit(1719881998.652:1244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:39692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:58.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:39692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:59:58.692000 audit[4084]: USER_ACCT pid=4084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.695029 sshd[4084]: Accepted publickey for core from 10.0.0.1 port 39692 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:59:58.695902 sshd[4084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:59:58.693000 audit[4084]: CRED_ACQ pid=4084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.699115 kernel: audit: type=1101 audit(1719881998.692:1245): pid=4084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.699191 kernel: audit: type=1103 audit(1719881998.693:1246): pid=4084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.699215 kernel: audit: type=1006 audit(1719881998.694:1247): pid=4084 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 00:59:58.700314 kernel: audit: type=1300 audit(1719881998.694:1247): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc04c210 a2=3 a3=1 items=0 ppid=1 pid=4084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:58.694000 audit[4084]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc04c210 a2=3 a3=1 items=0 ppid=1 pid=4084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:59:58.701403 systemd-logind[1201]: New session 14 of user core. Jul 2 00:59:58.701853 systemd[1]: Started session-14.scope. Jul 2 00:59:58.703691 kernel: audit: type=1327 audit(1719881998.694:1247): proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:58.694000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:59:58.704000 audit[4084]: USER_START pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.705000 audit[4086]: CRED_ACQ pid=4086 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.710808 kernel: audit: type=1105 audit(1719881998.704:1248): pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.710860 kernel: audit: type=1103 audit(1719881998.705:1249): pid=4086 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.831809 sshd[4084]: pam_unix(sshd:session): session closed for user core Jul 2 00:59:58.831000 audit[4084]: USER_END pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.834464 systemd[1]: sshd@13-10.0.0.115:22-10.0.0.1:39692.service: Deactivated successfully. Jul 2 00:59:58.835185 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 00:59:58.831000 audit[4084]: CRED_DISP pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.836140 systemd-logind[1201]: Session 14 logged out. Waiting for processes to exit. Jul 2 00:59:58.837884 systemd-logind[1201]: Removed session 14. Jul 2 00:59:58.838820 kernel: audit: type=1106 audit(1719881998.831:1250): pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.838870 kernel: audit: type=1104 audit(1719881998.831:1251): pid=4084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:59:58.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:39692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:00.938878 kubelet[2051]: I0702 01:00:00.938156 2051 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:00:03.838493 systemd[1]: Started sshd@14-10.0.0.115:22-10.0.0.1:59276.service. Jul 2 01:00:03.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:03.839852 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:00:03.839923 kernel: audit: type=1130 audit(1719882003.837:1253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:03.883000 audit[4139]: USER_ACCT pid=4139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.886541 sshd[4139]: Accepted publickey for core from 10.0.0.1 port 59276 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:03.884000 audit[4139]: CRED_ACQ pid=4139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.888151 sshd[4139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:03.890561 kernel: audit: type=1101 audit(1719882003.883:1254): pid=4139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.890729 kernel: audit: type=1103 audit(1719882003.884:1255): pid=4139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.890757 kernel: audit: type=1006 audit(1719882003.884:1256): pid=4139 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 01:00:03.884000 audit[4139]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd83a000 a2=3 a3=1 items=0 ppid=1 pid=4139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:03.894500 kernel: audit: type=1300 audit(1719882003.884:1256): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd83a000 a2=3 a3=1 items=0 ppid=1 pid=4139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:03.894566 kernel: audit: type=1327 audit(1719882003.884:1256): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:03.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:03.895378 systemd-logind[1201]: New session 15 of user core. Jul 2 01:00:03.895612 systemd[1]: Started session-15.scope. Jul 2 01:00:03.897000 audit[4139]: USER_START pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.897000 audit[4141]: CRED_ACQ pid=4141 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.904215 kernel: audit: type=1105 audit(1719882003.897:1257): pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:03.904297 kernel: audit: type=1103 audit(1719882003.897:1258): pid=4141 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:04.027413 sshd[4139]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:04.026000 audit[4139]: USER_END pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:04.026000 audit[4139]: CRED_DISP pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:04.031729 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 01:00:04.032301 systemd[1]: sshd@14-10.0.0.115:22-10.0.0.1:59276.service: Deactivated successfully. Jul 2 01:00:04.033169 kernel: audit: type=1106 audit(1719882004.026:1259): pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:04.033235 kernel: audit: type=1104 audit(1719882004.026:1260): pid=4139 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:04.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:04.033753 systemd-logind[1201]: Session 15 logged out. Waiting for processes to exit. Jul 2 01:00:04.034472 systemd-logind[1201]: Removed session 15. Jul 2 01:00:04.792000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:04.792000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022f8d50 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:04.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:04.793000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:04.793000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ee64e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:04.793000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:05.633000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.633000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400d304cc0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.633000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:05.633000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.633000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4009a19780 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.633000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:05.643000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.643000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400d978e10 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.643000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:05.643000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.643000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400d304db0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.643000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:05.647000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.647000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400d304ed0 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.647000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:05.647000 audit[1914]: AVC avc: denied { watch } for pid=1914 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:05.647000 audit[1914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40097c6080 a2=fc6 a3=0 items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c143 key=(null) Jul 2 01:00:05.647000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 01:00:07.345775 systemd[1]: run-containerd-runc-k8s.io-cc6be755b62dc00c71f96f76882a5540ec0f7c8039ebe3d2eda11663407bb17e-runc.W7lsBt.mount: Deactivated successfully. Jul 2 01:00:07.396947 kubelet[2051]: E0702 01:00:07.396917 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 01:00:08.420177 env[1212]: time="2024-07-02T01:00:08.420138352Z" level=info msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.454 [WARNING][4200] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t7hk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e1f0999-4b54-4a92-8804-3d78fb6e8151", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0", Pod:"csi-node-driver-t7hk6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4fae6221b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.454 [INFO][4200] k8s.go 608: Cleaning up netns ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.454 [INFO][4200] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" iface="eth0" netns="" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.454 [INFO][4200] k8s.go 615: Releasing IP address(es) ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.454 [INFO][4200] utils.go 188: Calico CNI releasing IP address ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.480 [INFO][4208] ipam_plugin.go 411: Releasing address using handleID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.480 [INFO][4208] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.480 [INFO][4208] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.500 [WARNING][4208] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.500 [INFO][4208] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.502 [INFO][4208] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.510127 env[1212]: 2024-07-02 01:00:08.506 [INFO][4200] k8s.go 621: Teardown processing complete. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.510127 env[1212]: time="2024-07-02T01:00:08.509453986Z" level=info msg="TearDown network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" successfully" Jul 2 01:00:08.510127 env[1212]: time="2024-07-02T01:00:08.509483626Z" level=info msg="StopPodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" returns successfully" Jul 2 01:00:08.511489 env[1212]: time="2024-07-02T01:00:08.511453699Z" level=info msg="RemovePodSandbox for \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" Jul 2 01:00:08.511615 env[1212]: time="2024-07-02T01:00:08.511492580Z" level=info msg="Forcibly stopping sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\"" Jul 2 01:00:08.514000 audit[4217]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4217 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:08.514000 audit[4217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdacdbe70 a2=0 a3=1 items=0 ppid=2214 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:08.518167 kubelet[2051]: I0702 01:00:08.518040 2051 topology_manager.go:215] "Topology Admit Handler" podUID="eac3b4ed-9482-452f-baaa-79438b15a417" podNamespace="calico-apiserver" podName="calico-apiserver-8697fcc6b5-bwcc8" Jul 2 01:00:08.518000 audit[4217]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4217 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:08.518000 audit[4217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdacdbe70 a2=0 a3=1 items=0 ppid=2214 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:08.524935 systemd[1]: Created slice kubepods-besteffort-podeac3b4ed_9482_452f_baaa_79438b15a417.slice. Jul 2 01:00:08.549000 audit[4240]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:08.549000 audit[4240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff6a58ce0 a2=0 a3=1 items=0 ppid=2214 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:08.551000 audit[4240]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:08.551000 audit[4240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff6a58ce0 a2=0 a3=1 items=0 ppid=2214 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.561 [WARNING][4233] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t7hk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e1f0999-4b54-4a92-8804-3d78fb6e8151", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b21226583bd943f3047e456c7d3bfabdce4c309e6da42bbcfc5410a67da020f0", Pod:"csi-node-driver-t7hk6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4fae6221b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.562 [INFO][4233] k8s.go 608: Cleaning up netns ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.562 [INFO][4233] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" iface="eth0" netns="" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.562 [INFO][4233] k8s.go 615: Releasing IP address(es) ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.562 [INFO][4233] utils.go 188: Calico CNI releasing IP address ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.596 [INFO][4242] ipam_plugin.go 411: Releasing address using handleID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.596 [INFO][4242] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.596 [INFO][4242] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.604 [WARNING][4242] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.604 [INFO][4242] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" HandleID="k8s-pod-network.ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Workload="localhost-k8s-csi--node--driver--t7hk6-eth0" Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.606 [INFO][4242] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.611719 env[1212]: 2024-07-02 01:00:08.608 [INFO][4233] k8s.go 621: Teardown processing complete. ContainerID="ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d" Jul 2 01:00:08.612439 env[1212]: time="2024-07-02T01:00:08.612408325Z" level=info msg="TearDown network for sandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" successfully" Jul 2 01:00:08.620362 env[1212]: time="2024-07-02T01:00:08.620305896Z" level=info msg="RemovePodSandbox \"ae983e7495f90bba76ea2176493fb0083870dbcc11e7dc1249760ac9c6f91f7d\" returns successfully" Jul 2 01:00:08.620990 env[1212]: time="2024-07-02T01:00:08.620962027Z" level=info msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" Jul 2 01:00:08.684024 kubelet[2051]: I0702 01:00:08.683771 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2j2g2\" (UniqueName: \"kubernetes.io/projected/eac3b4ed-9482-452f-baaa-79438b15a417-kube-api-access-2j2g2\") pod \"calico-apiserver-8697fcc6b5-bwcc8\" (UID: \"eac3b4ed-9482-452f-baaa-79438b15a417\") " pod="calico-apiserver/calico-apiserver-8697fcc6b5-bwcc8" Jul 2 01:00:08.684024 kubelet[2051]: I0702 01:00:08.683818 2051 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eac3b4ed-9482-452f-baaa-79438b15a417-calico-apiserver-certs\") pod \"calico-apiserver-8697fcc6b5-bwcc8\" (UID: \"eac3b4ed-9482-452f-baaa-79438b15a417\") " pod="calico-apiserver/calico-apiserver-8697fcc6b5-bwcc8" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.653 [WARNING][4267] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"11698b24-20f9-48a6-a5bb-64a45c9c4b88", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c", Pod:"coredns-7db6d8ff4d-pdm7q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2fcbed0d53d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.653 [INFO][4267] k8s.go 608: Cleaning up netns ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.653 [INFO][4267] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" iface="eth0" netns="" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.653 [INFO][4267] k8s.go 615: Releasing IP address(es) ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.653 [INFO][4267] utils.go 188: Calico CNI releasing IP address ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.675 [INFO][4274] ipam_plugin.go 411: Releasing address using handleID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.675 [INFO][4274] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.675 [INFO][4274] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.683 [WARNING][4274] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.683 [INFO][4274] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.685 [INFO][4274] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.688257 env[1212]: 2024-07-02 01:00:08.686 [INFO][4267] k8s.go 621: Teardown processing complete. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.688783 env[1212]: time="2024-07-02T01:00:08.688747666Z" level=info msg="TearDown network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" successfully" Jul 2 01:00:08.688856 env[1212]: time="2024-07-02T01:00:08.688840067Z" level=info msg="StopPodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" returns successfully" Jul 2 01:00:08.689328 env[1212]: time="2024-07-02T01:00:08.689297515Z" level=info msg="RemovePodSandbox for \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" Jul 2 01:00:08.689391 env[1212]: time="2024-07-02T01:00:08.689333075Z" level=info msg="Forcibly stopping sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\"" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.721 [WARNING][4297] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"11698b24-20f9-48a6-a5bb-64a45c9c4b88", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"500ea232f9546fffbc59e4a6e8584f6a3d3fe2a14eb705bc47af1e5f6f28151c", Pod:"coredns-7db6d8ff4d-pdm7q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2fcbed0d53d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.722 [INFO][4297] k8s.go 608: Cleaning up netns ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.722 [INFO][4297] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" iface="eth0" netns="" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.722 [INFO][4297] k8s.go 615: Releasing IP address(es) ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.722 [INFO][4297] utils.go 188: Calico CNI releasing IP address ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.740 [INFO][4305] ipam_plugin.go 411: Releasing address using handleID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.740 [INFO][4305] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.741 [INFO][4305] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.748 [WARNING][4305] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.748 [INFO][4305] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" HandleID="k8s-pod-network.7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Workload="localhost-k8s-coredns--7db6d8ff4d--pdm7q-eth0" Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.749 [INFO][4305] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.753095 env[1212]: 2024-07-02 01:00:08.751 [INFO][4297] k8s.go 621: Teardown processing complete. ContainerID="7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5" Jul 2 01:00:08.753694 env[1212]: time="2024-07-02T01:00:08.753113368Z" level=info msg="TearDown network for sandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" successfully" Jul 2 01:00:08.755592 env[1212]: time="2024-07-02T01:00:08.755546768Z" level=info msg="RemovePodSandbox \"7e5d9135d503fdd5da08e1772e0cf6240eaeb94bd2b831e03121182d052426f5\" returns successfully" Jul 2 01:00:08.756050 env[1212]: time="2024-07-02T01:00:08.756025456Z" level=info msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" Jul 2 01:00:08.786792 kubelet[2051]: E0702 01:00:08.786709 2051 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:00:08.787985 kubelet[2051]: E0702 01:00:08.787456 2051 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/eac3b4ed-9482-452f-baaa-79438b15a417-calico-apiserver-certs podName:eac3b4ed-9482-452f-baaa-79438b15a417 nodeName:}" failed. No retries permitted until 2024-07-02 01:00:09.286787804 +0000 UTC m=+60.963104910 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/eac3b4ed-9482-452f-baaa-79438b15a417-calico-apiserver-certs") pod "calico-apiserver-8697fcc6b5-bwcc8" (UID: "eac3b4ed-9482-452f-baaa-79438b15a417") : secret "calico-apiserver-certs" not found Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.794 [WARNING][4327] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0", GenerateName:"calico-kube-controllers-8d6774f6f-", Namespace:"calico-system", SelfLink:"", UID:"271669f5-ff18-44c4-98a9-386c9abbddbc", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8d6774f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260", Pod:"calico-kube-controllers-8d6774f6f-q8d79", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif4dec6e586b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.795 [INFO][4327] k8s.go 608: Cleaning up netns ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.795 [INFO][4327] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" iface="eth0" netns="" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.795 [INFO][4327] k8s.go 615: Releasing IP address(es) ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.795 [INFO][4327] utils.go 188: Calico CNI releasing IP address ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.815 [INFO][4335] ipam_plugin.go 411: Releasing address using handleID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.815 [INFO][4335] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.815 [INFO][4335] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.824 [WARNING][4335] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.824 [INFO][4335] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.831 [INFO][4335] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.835489 env[1212]: 2024-07-02 01:00:08.834 [INFO][4327] k8s.go 621: Teardown processing complete. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.836036 env[1212]: time="2024-07-02T01:00:08.836002896Z" level=info msg="TearDown network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" successfully" Jul 2 01:00:08.836113 env[1212]: time="2024-07-02T01:00:08.836097058Z" level=info msg="StopPodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" returns successfully" Jul 2 01:00:08.836599 env[1212]: time="2024-07-02T01:00:08.836552785Z" level=info msg="RemovePodSandbox for \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" Jul 2 01:00:08.836841 env[1212]: time="2024-07-02T01:00:08.836783349Z" level=info msg="Forcibly stopping sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\"" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.885 [WARNING][4358] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0", GenerateName:"calico-kube-controllers-8d6774f6f-", Namespace:"calico-system", SelfLink:"", UID:"271669f5-ff18-44c4-98a9-386c9abbddbc", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8d6774f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"467ccb42b6d09c8f04071386746df5c349ffbf134c0009fa2b8d77095f108260", Pod:"calico-kube-controllers-8d6774f6f-q8d79", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif4dec6e586b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.885 [INFO][4358] k8s.go 608: Cleaning up netns ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.885 [INFO][4358] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" iface="eth0" netns="" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.885 [INFO][4358] k8s.go 615: Releasing IP address(es) ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.885 [INFO][4358] utils.go 188: Calico CNI releasing IP address ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.903 [INFO][4366] ipam_plugin.go 411: Releasing address using handleID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.903 [INFO][4366] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.903 [INFO][4366] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.911 [WARNING][4366] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.911 [INFO][4366] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" HandleID="k8s-pod-network.b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Workload="localhost-k8s-calico--kube--controllers--8d6774f6f--q8d79-eth0" Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.912 [INFO][4366] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.916286 env[1212]: 2024-07-02 01:00:08.914 [INFO][4358] k8s.go 621: Teardown processing complete. ContainerID="b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def" Jul 2 01:00:08.916877 env[1212]: time="2024-07-02T01:00:08.916836351Z" level=info msg="TearDown network for sandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" successfully" Jul 2 01:00:08.919566 env[1212]: time="2024-07-02T01:00:08.919531435Z" level=info msg="RemovePodSandbox \"b2c946ab08d29dc80c2d5678298e12eb6d9cffb4d40aa5b71bef548e5d0e9def\" returns successfully" Jul 2 01:00:08.920200 env[1212]: time="2024-07-02T01:00:08.920179006Z" level=info msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.954 [WARNING][4389] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5", Pod:"coredns-7db6d8ff4d-bv7qs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e604cde512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.954 [INFO][4389] k8s.go 608: Cleaning up netns ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.954 [INFO][4389] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" iface="eth0" netns="" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.954 [INFO][4389] k8s.go 615: Releasing IP address(es) ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.954 [INFO][4389] utils.go 188: Calico CNI releasing IP address ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.971 [INFO][4397] ipam_plugin.go 411: Releasing address using handleID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.972 [INFO][4397] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.972 [INFO][4397] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.980 [WARNING][4397] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.980 [INFO][4397] ipam_plugin.go 439: Releasing address using workloadID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.981 [INFO][4397] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:08.986111 env[1212]: 2024-07-02 01:00:08.983 [INFO][4389] k8s.go 621: Teardown processing complete. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:08.986625 env[1212]: time="2024-07-02T01:00:08.986569542Z" level=info msg="TearDown network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" successfully" Jul 2 01:00:08.986703 env[1212]: time="2024-07-02T01:00:08.986685864Z" level=info msg="StopPodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" returns successfully" Jul 2 01:00:08.987154 env[1212]: time="2024-07-02T01:00:08.987129471Z" level=info msg="RemovePodSandbox for \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" Jul 2 01:00:08.987316 env[1212]: time="2024-07-02T01:00:08.987278954Z" level=info msg="Forcibly stopping sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\"" Jul 2 01:00:09.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:59290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:09.031875 systemd[1]: Started sshd@15-10.0.0.115:22-10.0.0.1:59290.service. Jul 2 01:00:09.035090 kernel: kauditd_printk_skb: 37 callbacks suppressed Jul 2 01:00:09.035165 kernel: audit: type=1130 audit(1719882009.030:1274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:59290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.019 [WARNING][4421] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1b25cfd0-b6c3-49e6-a63d-5a37c1451e86", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 59, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a15a633d7b6548d35143001fe6cd980771b3e4dd2d224b9bf1014cb410b129c5", Pod:"coredns-7db6d8ff4d-bv7qs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e604cde512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.019 [INFO][4421] k8s.go 608: Cleaning up netns ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.019 [INFO][4421] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" iface="eth0" netns="" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.019 [INFO][4421] k8s.go 615: Releasing IP address(es) ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.019 [INFO][4421] utils.go 188: Calico CNI releasing IP address ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.044 [INFO][4429] ipam_plugin.go 411: Releasing address using handleID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.044 [INFO][4429] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.044 [INFO][4429] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.052 [WARNING][4429] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.052 [INFO][4429] ipam_plugin.go 439: Releasing address using workloadID ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" HandleID="k8s-pod-network.582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Workload="localhost-k8s-coredns--7db6d8ff4d--bv7qs-eth0" Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.053 [INFO][4429] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:09.058176 env[1212]: 2024-07-02 01:00:09.055 [INFO][4421] k8s.go 621: Teardown processing complete. ContainerID="582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0" Jul 2 01:00:09.058591 env[1212]: time="2024-07-02T01:00:09.058190875Z" level=info msg="TearDown network for sandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" successfully" Jul 2 01:00:09.060957 env[1212]: time="2024-07-02T01:00:09.060926400Z" level=info msg="RemovePodSandbox \"582d642f167e43cd18a118cebd1361e24e3d13b1f522b6953822880a7c2a6de0\" returns successfully" Jul 2 01:00:09.075000 audit[4436]: USER_ACCT pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.077545 sshd[4436]: Accepted publickey for core from 10.0.0.1 port 59290 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:09.078779 sshd[4436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:09.076000 audit[4436]: CRED_ACQ pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.083745 kernel: audit: type=1101 audit(1719882009.075:1275): pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.083888 kernel: audit: type=1103 audit(1719882009.076:1276): pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.083918 kernel: audit: type=1006 audit(1719882009.076:1277): pid=4436 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 01:00:09.083937 kernel: audit: type=1300 audit(1719882009.076:1277): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb448ff0 a2=3 a3=1 items=0 ppid=1 pid=4436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.076000 audit[4436]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb448ff0 a2=3 a3=1 items=0 ppid=1 pid=4436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.083040 systemd[1]: Started session-16.scope. Jul 2 01:00:09.083391 systemd-logind[1201]: New session 16 of user core. Jul 2 01:00:09.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:09.086600 kernel: audit: type=1327 audit(1719882009.076:1277): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:09.086000 audit[4436]: USER_START pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.087000 audit[4439]: CRED_ACQ pid=4439 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.092358 kernel: audit: type=1105 audit(1719882009.086:1278): pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.092398 kernel: audit: type=1103 audit(1719882009.087:1279): pid=4439 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.226295 sshd[4436]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:09.230000 audit[4436]: USER_END pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.231000 audit[4436]: CRED_DISP pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.234411 systemd[1]: sshd@15-10.0.0.115:22-10.0.0.1:59290.service: Deactivated successfully. Jul 2 01:00:09.235133 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 01:00:09.235499 systemd-logind[1201]: Session 16 logged out. Waiting for processes to exit. Jul 2 01:00:09.237159 kernel: audit: type=1106 audit(1719882009.230:1280): pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.237223 kernel: audit: type=1104 audit(1719882009.231:1281): pid=4436 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:09.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:59290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:09.236921 systemd-logind[1201]: Removed session 16. Jul 2 01:00:09.429268 env[1212]: time="2024-07-02T01:00:09.429224182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8697fcc6b5-bwcc8,Uid:eac3b4ed-9482-452f-baaa-79438b15a417,Namespace:calico-apiserver,Attempt:0,}" Jul 2 01:00:09.542739 systemd-networkd[1038]: cali46bc4403613: Link UP Jul 2 01:00:09.544125 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:00:09.544179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali46bc4403613: link becomes ready Jul 2 01:00:09.544029 systemd-networkd[1038]: cali46bc4403613: Gained carrier Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.469 [INFO][4451] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0 calico-apiserver-8697fcc6b5- calico-apiserver eac3b4ed-9482-452f-baaa-79438b15a417 994 0 2024-07-02 01:00:08 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8697fcc6b5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8697fcc6b5-bwcc8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali46bc4403613 [] []}} ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.469 [INFO][4451] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.496 [INFO][4464] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" HandleID="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Workload="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.509 [INFO][4464] ipam_plugin.go 264: Auto assigning IP ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" HandleID="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Workload="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027c2f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8697fcc6b5-bwcc8", "timestamp":"2024-07-02 01:00:09.496532763 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.509 [INFO][4464] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.509 [INFO][4464] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.509 [INFO][4464] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.511 [INFO][4464] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.514 [INFO][4464] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.519 [INFO][4464] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.520 [INFO][4464] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.523 [INFO][4464] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.523 [INFO][4464] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.527 [INFO][4464] ipam.go 1685: Creating new handle: k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.531 [INFO][4464] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.536 [INFO][4464] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.537 [INFO][4464] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" host="localhost" Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.537 [INFO][4464] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:00:09.559325 env[1212]: 2024-07-02 01:00:09.537 [INFO][4464] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" HandleID="k8s-pod-network.182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Workload="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.538 [INFO][4451] k8s.go 386: Populated endpoint ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0", GenerateName:"calico-apiserver-8697fcc6b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"eac3b4ed-9482-452f-baaa-79438b15a417", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 0, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8697fcc6b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8697fcc6b5-bwcc8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46bc4403613", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.538 [INFO][4451] k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.538 [INFO][4451] dataplane_linux.go 68: Setting the host side veth name to cali46bc4403613 ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.547 [INFO][4451] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.547 [INFO][4451] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0", GenerateName:"calico-apiserver-8697fcc6b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"eac3b4ed-9482-452f-baaa-79438b15a417", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 0, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8697fcc6b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e", Pod:"calico-apiserver-8697fcc6b5-bwcc8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46bc4403613", MAC:"ca:9d:36:67:b0:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:00:09.559967 env[1212]: 2024-07-02 01:00:09.557 [INFO][4451] k8s.go 500: Wrote updated endpoint to datastore ContainerID="182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e" Namespace="calico-apiserver" Pod="calico-apiserver-8697fcc6b5-bwcc8" WorkloadEndpoint="localhost-k8s-calico--apiserver--8697fcc6b5--bwcc8-eth0" Jul 2 01:00:09.570000 audit[4487]: NETFILTER_CFG table=filter:117 family=2 entries=61 op=nft_register_chain pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:00:09.570000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30316 a0=3 a1=ffffcb2018a0 a2=0 a3=ffffa6899fa8 items=0 ppid=3152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:00:09.578610 env[1212]: time="2024-07-02T01:00:09.578543584Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:00:09.578610 env[1212]: time="2024-07-02T01:00:09.578602065Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:00:09.578774 env[1212]: time="2024-07-02T01:00:09.578624105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:00:09.578774 env[1212]: time="2024-07-02T01:00:09.578741747Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e pid=4496 runtime=io.containerd.runc.v2 Jul 2 01:00:09.596081 systemd[1]: Started cri-containerd-182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e.scope. Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit: BPF prog-id=174 op=LOAD Jul 2 01:00:09.625000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[4506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4496 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326166373338346466363339336132383034336534646236313739 Jul 2 01:00:09.625000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.625000 audit[4506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4496 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326166373338346466363339336132383034336534646236313739 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit: BPF prog-id=175 op=LOAD Jul 2 01:00:09.626000 audit[4506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4496 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326166373338346466363339336132383034336534646236313739 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit: BPF prog-id=176 op=LOAD Jul 2 01:00:09.626000 audit[4506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4496 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326166373338346466363339336132383034336534646236313739 Jul 2 01:00:09.626000 audit: BPF prog-id=176 op=UNLOAD Jul 2 01:00:09.626000 audit: BPF prog-id=175 op=UNLOAD Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:09.626000 audit: BPF prog-id=177 op=LOAD Jul 2 01:00:09.626000 audit[4506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4496 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:09.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326166373338346466363339336132383034336534646236313739 Jul 2 01:00:09.628364 systemd-resolved[1152]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 01:00:09.644098 env[1212]: time="2024-07-02T01:00:09.644060255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8697fcc6b5-bwcc8,Uid:eac3b4ed-9482-452f-baaa-79438b15a417,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e\"" Jul 2 01:00:09.646569 env[1212]: time="2024-07-02T01:00:09.646520976Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 01:00:09.796628 systemd[1]: run-containerd-runc-k8s.io-182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e-runc.VQGwuZ.mount: Deactivated successfully. Jul 2 01:00:10.673744 systemd-networkd[1038]: cali46bc4403613: Gained IPv6LL Jul 2 01:00:11.583765 env[1212]: time="2024-07-02T01:00:11.583713662Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:00:11.585531 env[1212]: time="2024-07-02T01:00:11.585492050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:00:11.587303 env[1212]: time="2024-07-02T01:00:11.587260599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:00:11.589364 env[1212]: time="2024-07-02T01:00:11.589334032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:00:11.590260 env[1212]: time="2024-07-02T01:00:11.590231286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 01:00:11.593429 env[1212]: time="2024-07-02T01:00:11.593380417Z" level=info msg="CreateContainer within sandbox \"182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 01:00:11.603054 env[1212]: time="2024-07-02T01:00:11.602991932Z" level=info msg="CreateContainer within sandbox \"182af7384df6393a28043e4db6179c3d70bc3d7d169a14c9ef03ae66be36ec7e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f202c05177d34be27287a448aedee9ef5fa6f4d697210d6951a01acc4f3f5602\"" Jul 2 01:00:11.604730 env[1212]: time="2024-07-02T01:00:11.604671918Z" level=info msg="StartContainer for \"f202c05177d34be27287a448aedee9ef5fa6f4d697210d6951a01acc4f3f5602\"" Jul 2 01:00:11.626766 systemd[1]: run-containerd-runc-k8s.io-f202c05177d34be27287a448aedee9ef5fa6f4d697210d6951a01acc4f3f5602-runc.HDRJvx.mount: Deactivated successfully. Jul 2 01:00:11.629178 systemd[1]: Started cri-containerd-f202c05177d34be27287a448aedee9ef5fa6f4d697210d6951a01acc4f3f5602.scope. Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit: BPF prog-id=178 op=LOAD Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4496 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303263303531373764333462653237323837613434386165646565 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4496 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303263303531373764333462653237323837613434386165646565 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit: BPF prog-id=179 op=LOAD Jul 2 01:00:11.653000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4496 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303263303531373764333462653237323837613434386165646565 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit: BPF prog-id=180 op=LOAD Jul 2 01:00:11.653000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4496 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303263303531373764333462653237323837613434386165646565 Jul 2 01:00:11.653000 audit: BPF prog-id=180 op=UNLOAD Jul 2 01:00:11.653000 audit: BPF prog-id=179 op=UNLOAD Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:11.653000 audit: BPF prog-id=181 op=LOAD Jul 2 01:00:11.653000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4496 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303263303531373764333462653237323837613434386165646565 Jul 2 01:00:11.673710 env[1212]: time="2024-07-02T01:00:11.673670187Z" level=info msg="StartContainer for \"f202c05177d34be27287a448aedee9ef5fa6f4d697210d6951a01acc4f3f5602\" returns successfully" Jul 2 01:00:12.479000 audit[4547]: AVC avc: denied { watch } for pid=4547 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_00_09.2981801326/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c546,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c546,c849 tclass=file permissive=0 Jul 2 01:00:12.479000 audit[4547]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006a3400 a2=fc6 a3=0 items=0 ppid=4496 pid=4547 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c546,c849 key=(null) Jul 2 01:00:12.479000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:00:12.642251 kubelet[2051]: I0702 01:00:12.642188 2051 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8697fcc6b5-bwcc8" podStartSLOduration=2.697103975 podStartE2EDuration="4.642171508s" podCreationTimestamp="2024-07-02 01:00:08 +0000 UTC" firstStartedPulling="2024-07-02 01:00:09.646255731 +0000 UTC m=+61.322572837" lastFinishedPulling="2024-07-02 01:00:11.591323264 +0000 UTC m=+63.267640370" observedRunningTime="2024-07-02 01:00:12.628266846 +0000 UTC m=+64.304583952" watchObservedRunningTime="2024-07-02 01:00:12.642171508 +0000 UTC m=+64.318488614" Jul 2 01:00:12.641000 audit[4568]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:12.641000 audit[4568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe58bae60 a2=0 a3=1 items=0 ppid=2214 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:12.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:12.643000 audit[4568]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:12.643000 audit[4568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe58bae60 a2=0 a3=1 items=0 ppid=2214 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:12.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:12.657000 audit[4570]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:12.657000 audit[4570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc79c5430 a2=0 a3=1 items=0 ppid=2214 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:12.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:12.659000 audit[4570]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:12.659000 audit[4570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc79c5430 a2=0 a3=1 items=0 ppid=2214 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:12.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:14.231235 systemd[1]: Started sshd@16-10.0.0.115:22-10.0.0.1:41982.service. Jul 2 01:00:14.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.234757 kernel: kauditd_printk_skb: 133 callbacks suppressed Jul 2 01:00:14.234907 kernel: audit: type=1130 audit(1719882014.229:1325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.276000 audit[4572]: USER_ACCT pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.278526 sshd[4572]: Accepted publickey for core from 10.0.0.1 port 41982 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:14.280091 sshd[4572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:14.278000 audit[4572]: CRED_ACQ pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.282894 kernel: audit: type=1101 audit(1719882014.276:1326): pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.282952 kernel: audit: type=1103 audit(1719882014.278:1327): pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.282974 kernel: audit: type=1006 audit(1719882014.278:1328): pid=4572 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 01:00:14.284115 kernel: audit: type=1300 audit(1719882014.278:1328): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e2d970 a2=3 a3=1 items=0 ppid=1 pid=4572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.278000 audit[4572]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e2d970 a2=3 a3=1 items=0 ppid=1 pid=4572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.285354 systemd[1]: Started session-17.scope. Jul 2 01:00:14.285659 systemd-logind[1201]: New session 17 of user core. Jul 2 01:00:14.288587 kernel: audit: type=1327 audit(1719882014.278:1328): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:14.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:14.292000 audit[4572]: USER_START pid=4572 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.294000 audit[4574]: CRED_ACQ pid=4574 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.299121 kernel: audit: type=1105 audit(1719882014.292:1329): pid=4572 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.299189 kernel: audit: type=1103 audit(1719882014.294:1330): pid=4574 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.359000 audit[4584]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:14.359000 audit[4584]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdf08f840 a2=0 a3=1 items=0 ppid=2214 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.365213 kernel: audit: type=1325 audit(1719882014.359:1331): table=filter:122 family=2 entries=8 op=nft_register_rule pid=4584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:14.365316 kernel: audit: type=1300 audit(1719882014.359:1331): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdf08f840 a2=0 a3=1 items=0 ppid=2214 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:14.360000 audit[4584]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=4584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:14.360000 audit[4584]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdf08f840 a2=0 a3=1 items=0 ppid=2214 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:14.461624 sshd[4572]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:14.461000 audit[4572]: USER_END pid=4572 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.461000 audit[4572]: CRED_DISP pid=4572 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.115:22-10.0.0.1:41992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.465867 systemd[1]: Started sshd@17-10.0.0.115:22-10.0.0.1:41992.service. Jul 2 01:00:14.469001 systemd[1]: sshd@16-10.0.0.115:22-10.0.0.1:41982.service: Deactivated successfully. Jul 2 01:00:14.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.469758 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 01:00:14.470656 systemd-logind[1201]: Session 17 logged out. Waiting for processes to exit. Jul 2 01:00:14.471454 systemd-logind[1201]: Removed session 17. Jul 2 01:00:14.506000 audit[4587]: USER_ACCT pid=4587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.508602 sshd[4587]: Accepted publickey for core from 10.0.0.1 port 41992 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:14.508000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.508000 audit[4587]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc89af730 a2=3 a3=1 items=0 ppid=1 pid=4587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.508000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:14.510089 sshd[4587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:14.514297 systemd[1]: Started session-18.scope. Jul 2 01:00:14.514613 systemd-logind[1201]: New session 18 of user core. Jul 2 01:00:14.516000 audit[4587]: USER_START pid=4587 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.517000 audit[4590]: CRED_ACQ pid=4590 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.811243 sshd[4587]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:14.812000 audit[4587]: USER_END pid=4587 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.812000 audit[4587]: CRED_DISP pid=4587 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.115:22-10.0.0.1:41996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.815625 systemd[1]: Started sshd@18-10.0.0.115:22-10.0.0.1:41996.service. Jul 2 01:00:14.816246 systemd[1]: sshd@17-10.0.0.115:22-10.0.0.1:41992.service: Deactivated successfully. Jul 2 01:00:14.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.115:22-10.0.0.1:41992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:14.817015 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 01:00:14.817764 systemd-logind[1201]: Session 18 logged out. Waiting for processes to exit. Jul 2 01:00:14.819181 systemd-logind[1201]: Removed session 18. Jul 2 01:00:14.856000 audit[4600]: USER_ACCT pid=4600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.858465 sshd[4600]: Accepted publickey for core from 10.0.0.1 port 41996 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:14.857000 audit[4600]: CRED_ACQ pid=4600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.857000 audit[4600]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1fdbba0 a2=3 a3=1 items=0 ppid=1 pid=4600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:14.857000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:14.859656 sshd[4600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:14.862958 systemd-logind[1201]: New session 19 of user core. Jul 2 01:00:14.863835 systemd[1]: Started session-19.scope. Jul 2 01:00:14.866000 audit[4600]: USER_START pid=4600 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:14.867000 audit[4603]: CRED_ACQ pid=4603 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.324000 audit[4622]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=4622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:16.324000 audit[4622]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe6f396a0 a2=0 a3=1 items=0 ppid=2214 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:16.325000 audit[4622]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=4622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:16.325000 audit[4622]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe6f396a0 a2=0 a3=1 items=0 ppid=2214 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:16.335000 audit[4624]: NETFILTER_CFG table=filter:126 family=2 entries=32 op=nft_register_rule pid=4624 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:16.335000 audit[4624]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc4fc7dd0 a2=0 a3=1 items=0 ppid=2214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:16.339888 sshd[4600]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:16.340000 audit[4600]: USER_END pid=4600 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.340000 audit[4600]: CRED_DISP pid=4600 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.115:22-10.0.0.1:42008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:16.343845 systemd[1]: Started sshd@19-10.0.0.115:22-10.0.0.1:42008.service. Jul 2 01:00:16.344569 systemd[1]: sshd@18-10.0.0.115:22-10.0.0.1:41996.service: Deactivated successfully. Jul 2 01:00:16.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.115:22-10.0.0.1:41996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:16.345396 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 01:00:16.336000 audit[4624]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=4624 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:16.336000 audit[4624]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc4fc7dd0 a2=0 a3=1 items=0 ppid=2214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:16.346032 systemd-logind[1201]: Session 19 logged out. Waiting for processes to exit. Jul 2 01:00:16.347342 systemd-logind[1201]: Removed session 19. Jul 2 01:00:16.390000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.392702 sshd[4626]: Accepted publickey for core from 10.0.0.1 port 42008 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:16.391000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.391000 audit[4626]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaa8c970 a2=3 a3=1 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.391000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:16.393858 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:16.397024 systemd-logind[1201]: New session 20 of user core. Jul 2 01:00:16.397860 systemd[1]: Started session-20.scope. Jul 2 01:00:16.401000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.402000 audit[4629]: CRED_ACQ pid=4629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.644912 sshd[4626]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:16.644000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.645000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.115:22-10.0.0.1:42016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:16.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.115:22-10.0.0.1:42008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:16.648762 systemd[1]: Started sshd@20-10.0.0.115:22-10.0.0.1:42016.service. Jul 2 01:00:16.649243 systemd[1]: sshd@19-10.0.0.115:22-10.0.0.1:42008.service: Deactivated successfully. Jul 2 01:00:16.650082 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 01:00:16.654597 systemd-logind[1201]: Session 20 logged out. Waiting for processes to exit. Jul 2 01:00:16.656884 systemd-logind[1201]: Removed session 20. Jul 2 01:00:16.688000 audit[4638]: USER_ACCT pid=4638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.690012 sshd[4638]: Accepted publickey for core from 10.0.0.1 port 42016 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:16.688000 audit[4638]: CRED_ACQ pid=4638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.689000 audit[4638]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd66ff40 a2=3 a3=1 items=0 ppid=1 pid=4638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:16.689000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:16.691042 sshd[4638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:16.694408 systemd-logind[1201]: New session 21 of user core. Jul 2 01:00:16.695220 systemd[1]: Started session-21.scope. Jul 2 01:00:16.696000 audit[4638]: USER_START pid=4638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.698000 audit[4641]: CRED_ACQ pid=4641 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.834137 sshd[4638]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:16.833000 audit[4638]: USER_END pid=4638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.833000 audit[4638]: CRED_DISP pid=4638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:16.836918 systemd-logind[1201]: Session 21 logged out. Waiting for processes to exit. Jul 2 01:00:16.837183 systemd[1]: sshd@20-10.0.0.115:22-10.0.0.1:42016.service: Deactivated successfully. Jul 2 01:00:16.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.115:22-10.0.0.1:42016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:16.837946 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 01:00:16.838556 systemd-logind[1201]: Removed session 21. Jul 2 01:00:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40036aad60 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40036aad80 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40034531c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:19.065000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:00:19.065000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40034531e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c847,c862 key=(null) Jul 2 01:00:19.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:00:21.839030 systemd[1]: Started sshd@21-10.0.0.115:22-10.0.0.1:46838.service. Jul 2 01:00:21.842110 kernel: kauditd_printk_skb: 75 callbacks suppressed Jul 2 01:00:21.842194 kernel: audit: type=1130 audit(1719882021.837:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:46838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:21.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:46838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:21.879000 audit[4654]: USER_ACCT pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.881211 sshd[4654]: Accepted publickey for core from 10.0.0.1 port 46838 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:21.882532 sshd[4654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:21.880000 audit[4654]: CRED_ACQ pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.885591 kernel: audit: type=1101 audit(1719882021.879:1381): pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.885647 kernel: audit: type=1103 audit(1719882021.880:1382): pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.885682 kernel: audit: type=1006 audit(1719882021.880:1383): pid=4654 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 01:00:21.886123 systemd-logind[1201]: New session 22 of user core. Jul 2 01:00:21.880000 audit[4654]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe51c06b0 a2=3 a3=1 items=0 ppid=1 pid=4654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:21.887616 systemd[1]: Started session-22.scope. Jul 2 01:00:21.889461 kernel: audit: type=1300 audit(1719882021.880:1383): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe51c06b0 a2=3 a3=1 items=0 ppid=1 pid=4654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:21.889534 kernel: audit: type=1327 audit(1719882021.880:1383): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:21.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:21.889000 audit[4654]: USER_START pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.891000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.896062 kernel: audit: type=1105 audit(1719882021.889:1384): pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:21.896130 kernel: audit: type=1103 audit(1719882021.891:1385): pid=4656 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:22.004864 sshd[4654]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:22.004000 audit[4654]: USER_END pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:22.004000 audit[4654]: CRED_DISP pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:22.007680 systemd[1]: sshd@21-10.0.0.115:22-10.0.0.1:46838.service: Deactivated successfully. Jul 2 01:00:22.008402 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 01:00:22.009164 systemd-logind[1201]: Session 22 logged out. Waiting for processes to exit. Jul 2 01:00:22.009871 systemd-logind[1201]: Removed session 22. Jul 2 01:00:22.010461 kernel: audit: type=1106 audit(1719882022.004:1386): pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:22.010512 kernel: audit: type=1104 audit(1719882022.004:1387): pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:22.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:46838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:22.399000 audit[4667]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:22.399000 audit[4667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd34189b0 a2=0 a3=1 items=0 ppid=2214 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:22.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:22.402000 audit[4667]: NETFILTER_CFG table=nat:129 family=2 entries=106 op=nft_register_chain pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:22.402000 audit[4667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd34189b0 a2=0 a3=1 items=0 ppid=2214 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:22.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:26.504000 audit[4685]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=4685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:26.504000 audit[4685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe8779b00 a2=0 a3=1 items=0 ppid=2214 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:26.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:26.509000 audit[4685]: NETFILTER_CFG table=nat:131 family=2 entries=58 op=nft_register_chain pid=4685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:00:26.509000 audit[4685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffe8779b00 a2=0 a3=1 items=0 ppid=2214 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:26.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:00:27.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:46852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:27.009754 systemd[1]: Started sshd@22-10.0.0.115:22-10.0.0.1:46852.service. Jul 2 01:00:27.012350 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 01:00:27.012410 kernel: audit: type=1130 audit(1719882027.008:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:46852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:27.047000 audit[4687]: USER_ACCT pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.049234 sshd[4687]: Accepted publickey for core from 10.0.0.1 port 46852 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:27.050293 sshd[4687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:27.048000 audit[4687]: CRED_ACQ pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.054823 kernel: audit: type=1101 audit(1719882027.047:1394): pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.054896 kernel: audit: type=1103 audit(1719882027.048:1395): pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.054920 kernel: audit: type=1006 audit(1719882027.048:1396): pid=4687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 01:00:27.054185 systemd[1]: Started session-23.scope. Jul 2 01:00:27.048000 audit[4687]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8d32910 a2=3 a3=1 items=0 ppid=1 pid=4687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:27.054465 systemd-logind[1201]: New session 23 of user core. Jul 2 01:00:27.057521 kernel: audit: type=1300 audit(1719882027.048:1396): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8d32910 a2=3 a3=1 items=0 ppid=1 pid=4687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:27.057619 kernel: audit: type=1327 audit(1719882027.048:1396): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:27.048000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:27.057000 audit[4687]: USER_START pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.058000 audit[4689]: CRED_ACQ pid=4689 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.063410 kernel: audit: type=1105 audit(1719882027.057:1397): pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.063511 kernel: audit: type=1103 audit(1719882027.058:1398): pid=4689 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.166037 sshd[4687]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:27.165000 audit[4687]: USER_END pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.165000 audit[4687]: CRED_DISP pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.168710 systemd[1]: sshd@22-10.0.0.115:22-10.0.0.1:46852.service: Deactivated successfully. Jul 2 01:00:27.169450 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 01:00:27.170329 systemd-logind[1201]: Session 23 logged out. Waiting for processes to exit. Jul 2 01:00:27.171156 systemd-logind[1201]: Removed session 23. Jul 2 01:00:27.171638 kernel: audit: type=1106 audit(1719882027.165:1399): pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.171707 kernel: audit: type=1104 audit(1719882027.165:1400): pid=4687 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:27.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:46852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:29.401520 kubelet[2051]: E0702 01:00:29.401469 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 01:00:30.973760 systemd[1]: run-containerd-runc-k8s.io-2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d-runc.YVS49H.mount: Deactivated successfully. Jul 2 01:00:32.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:32.171622 systemd[1]: Started sshd@23-10.0.0.115:22-10.0.0.1:37874.service. Jul 2 01:00:32.174901 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:00:32.175008 kernel: audit: type=1130 audit(1719882032.170:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:32.213000 audit[4724]: USER_ACCT pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.215662 sshd[4724]: Accepted publickey for core from 10.0.0.1 port 37874 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:32.216839 sshd[4724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:32.214000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.219998 kernel: audit: type=1101 audit(1719882032.213:1403): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.220068 kernel: audit: type=1103 audit(1719882032.214:1404): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.220099 kernel: audit: type=1006 audit(1719882032.214:1405): pid=4724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 01:00:32.214000 audit[4724]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2d157a0 a2=3 a3=1 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:32.222506 systemd-logind[1201]: New session 24 of user core. Jul 2 01:00:32.223404 systemd[1]: Started session-24.scope. Jul 2 01:00:32.223937 kernel: audit: type=1300 audit(1719882032.214:1405): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2d157a0 a2=3 a3=1 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:32.224020 kernel: audit: type=1327 audit(1719882032.214:1405): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:32.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:32.225000 audit[4724]: USER_START pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.227000 audit[4726]: CRED_ACQ pid=4726 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.232111 kernel: audit: type=1105 audit(1719882032.225:1406): pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.232195 kernel: audit: type=1103 audit(1719882032.227:1407): pid=4726 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.350316 sshd[4724]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:32.349000 audit[4724]: USER_END pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.353180 systemd[1]: sshd@23-10.0.0.115:22-10.0.0.1:37874.service: Deactivated successfully. Jul 2 01:00:32.354176 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 01:00:32.350000 audit[4724]: CRED_DISP pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.357058 systemd-logind[1201]: Session 24 logged out. Waiting for processes to exit. Jul 2 01:00:32.357685 kernel: audit: type=1106 audit(1719882032.349:1408): pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.357755 kernel: audit: type=1104 audit(1719882032.350:1409): pid=4724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:32.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:32.358772 systemd-logind[1201]: Removed session 24. Jul 2 01:00:33.401788 kubelet[2051]: E0702 01:00:33.401744 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 01:00:34.841692 systemd[1]: run-containerd-runc-k8s.io-2f9ca8dc73928c2976a4ff7ca41728c5517cfbae1ea7b219401e220ba9a72c2d-runc.tHrCJu.mount: Deactivated successfully. Jul 2 01:00:37.354681 systemd[1]: Started sshd@24-10.0.0.115:22-10.0.0.1:37888.service. Jul 2 01:00:37.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:37888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:37.357686 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:00:37.357762 kernel: audit: type=1130 audit(1719882037.353:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:37888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:37.395000 audit[4778]: USER_ACCT pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.397455 sshd[4778]: Accepted publickey for core from 10.0.0.1 port 37888 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:37.399180 sshd[4778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:37.397000 audit[4778]: CRED_ACQ pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.401961 kernel: audit: type=1101 audit(1719882037.395:1412): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.402018 kernel: audit: type=1103 audit(1719882037.397:1413): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.402046 kernel: audit: type=1006 audit(1719882037.397:1414): pid=4778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 01:00:37.403357 kernel: audit: type=1300 audit(1719882037.397:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9f6d310 a2=3 a3=1 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:37.397000 audit[4778]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9f6d310 a2=3 a3=1 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:37.403596 systemd[1]: Started session-25.scope. Jul 2 01:00:37.403918 systemd-logind[1201]: New session 25 of user core. Jul 2 01:00:37.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:37.406620 kernel: audit: type=1327 audit(1719882037.397:1414): proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:37.406000 audit[4778]: USER_START pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.407000 audit[4786]: CRED_ACQ pid=4786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.413301 kernel: audit: type=1105 audit(1719882037.406:1415): pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.413353 kernel: audit: type=1103 audit(1719882037.407:1416): pid=4786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.534569 sshd[4778]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:37.533000 audit[4778]: USER_END pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.537056 systemd[1]: sshd@24-10.0.0.115:22-10.0.0.1:37888.service: Deactivated successfully. Jul 2 01:00:37.537851 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 01:00:37.534000 audit[4778]: CRED_DISP pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.538380 systemd-logind[1201]: Session 25 logged out. Waiting for processes to exit. Jul 2 01:00:37.539019 systemd-logind[1201]: Removed session 25. Jul 2 01:00:37.540290 kernel: audit: type=1106 audit(1719882037.533:1417): pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.540346 kernel: audit: type=1104 audit(1719882037.534:1418): pid=4778 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:37.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:37888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:38.401914 kubelet[2051]: E0702 01:00:38.401834 2051 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"