Jul 2 07:53:27.202950 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:53:27.202985 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:27.203000 kernel: BIOS-provided physical RAM map: Jul 2 07:53:27.203010 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 2 07:53:27.203019 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Jul 2 07:53:27.203029 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Jul 2 07:53:27.203044 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Jul 2 07:53:27.203055 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Jul 2 07:53:27.203065 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Jul 2 07:53:27.203075 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Jul 2 07:53:27.203085 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Jul 2 07:53:27.203096 kernel: printk: bootconsole [earlyser0] enabled Jul 2 07:53:27.203106 kernel: NX (Execute Disable) protection: active Jul 2 07:53:27.203116 kernel: efi: EFI v2.70 by Microsoft Jul 2 07:53:27.203173 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c7a98 RNG=0x3ffd1018 Jul 2 07:53:27.203185 kernel: random: crng init done Jul 2 07:53:27.203196 kernel: SMBIOS 3.1.0 present. Jul 2 07:53:27.203207 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Jul 2 07:53:27.203219 kernel: Hypervisor detected: Microsoft Hyper-V Jul 2 07:53:27.203230 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Jul 2 07:53:27.203241 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Jul 2 07:53:27.203252 kernel: Hyper-V: Nested features: 0x1e0101 Jul 2 07:53:27.203266 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Jul 2 07:53:27.203277 kernel: Hyper-V: Using hypercall for remote TLB flush Jul 2 07:53:27.203288 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Jul 2 07:53:27.203299 kernel: tsc: Marking TSC unstable due to running on Hyper-V Jul 2 07:53:27.203311 kernel: tsc: Detected 2593.905 MHz processor Jul 2 07:53:27.203323 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:53:27.203335 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:53:27.203346 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Jul 2 07:53:27.203358 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:53:27.203369 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Jul 2 07:53:27.203383 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Jul 2 07:53:27.203394 kernel: Using GB pages for direct mapping Jul 2 07:53:27.203406 kernel: Secure boot disabled Jul 2 07:53:27.203417 kernel: ACPI: Early table checksum verification disabled Jul 2 07:53:27.203429 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Jul 2 07:53:27.203440 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203452 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203464 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 07:53:27.203482 kernel: ACPI: FACS 0x000000003FFFE000 000040 Jul 2 07:53:27.203494 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203507 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203519 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203531 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203544 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203559 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203571 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:27.203582 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Jul 2 07:53:27.203593 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Jul 2 07:53:27.203602 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Jul 2 07:53:27.203614 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Jul 2 07:53:27.203626 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Jul 2 07:53:27.203639 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Jul 2 07:53:27.203653 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Jul 2 07:53:27.203664 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Jul 2 07:53:27.203676 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Jul 2 07:53:27.203688 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Jul 2 07:53:27.203700 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:53:27.203717 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:53:27.203741 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Jul 2 07:53:27.203762 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Jul 2 07:53:27.203773 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Jul 2 07:53:27.203788 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Jul 2 07:53:27.203799 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Jul 2 07:53:27.203811 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Jul 2 07:53:27.203823 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Jul 2 07:53:27.203835 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Jul 2 07:53:27.203847 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Jul 2 07:53:27.203857 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Jul 2 07:53:27.203867 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Jul 2 07:53:27.203879 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Jul 2 07:53:27.203893 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Jul 2 07:53:27.203905 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Jul 2 07:53:27.203916 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Jul 2 07:53:27.203926 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Jul 2 07:53:27.203938 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Jul 2 07:53:27.203949 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Jul 2 07:53:27.203959 kernel: Zone ranges: Jul 2 07:53:27.203974 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:53:27.203990 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:53:27.204004 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:53:27.204014 kernel: Movable zone start for each node Jul 2 07:53:27.204024 kernel: Early memory node ranges Jul 2 07:53:27.204034 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 2 07:53:27.204045 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Jul 2 07:53:27.204056 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Jul 2 07:53:27.204066 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:53:27.204075 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Jul 2 07:53:27.204086 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:53:27.204100 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 2 07:53:27.204111 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Jul 2 07:53:27.204136 kernel: ACPI: PM-Timer IO Port: 0x408 Jul 2 07:53:27.204148 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Jul 2 07:53:27.204160 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:53:27.204170 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:53:27.204181 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:53:27.204193 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Jul 2 07:53:27.204206 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:53:27.204221 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Jul 2 07:53:27.204233 kernel: Booting paravirtualized kernel on Hyper-V Jul 2 07:53:27.204246 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:53:27.204260 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:53:27.204272 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:53:27.204285 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:53:27.204297 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:53:27.204309 kernel: Hyper-V: PV spinlocks enabled Jul 2 07:53:27.204322 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:53:27.204336 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Jul 2 07:53:27.204349 kernel: Policy zone: Normal Jul 2 07:53:27.204363 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:27.204377 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:53:27.204390 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:53:27.204403 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:53:27.204416 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:53:27.204429 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 308112K reserved, 0K cma-reserved) Jul 2 07:53:27.204445 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:53:27.204458 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:53:27.204481 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:53:27.204496 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:53:27.204511 kernel: rcu: RCU event tracing is enabled. Jul 2 07:53:27.204524 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:53:27.204538 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:53:27.204552 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:53:27.204565 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:53:27.204579 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:53:27.204592 kernel: Using NULL legacy PIC Jul 2 07:53:27.204612 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Jul 2 07:53:27.204626 kernel: Console: colour dummy device 80x25 Jul 2 07:53:27.204639 kernel: printk: console [tty1] enabled Jul 2 07:53:27.204653 kernel: printk: console [ttyS0] enabled Jul 2 07:53:27.204667 kernel: printk: bootconsole [earlyser0] disabled Jul 2 07:53:27.204682 kernel: ACPI: Core revision 20210730 Jul 2 07:53:27.204696 kernel: Failed to register legacy timer interrupt Jul 2 07:53:27.204709 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:53:27.204723 kernel: Hyper-V: Using IPI hypercalls Jul 2 07:53:27.204737 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Jul 2 07:53:27.204750 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:53:27.204764 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:53:27.204777 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:53:27.204790 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:53:27.204804 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:53:27.204819 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:53:27.204833 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jul 2 07:53:27.204846 kernel: RETBleed: Vulnerable Jul 2 07:53:27.204859 kernel: Speculative Store Bypass: Vulnerable Jul 2 07:53:27.204872 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:27.204885 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:27.204899 kernel: GDS: Unknown: Dependent on hypervisor status Jul 2 07:53:27.204912 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:53:27.204925 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:53:27.204938 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:53:27.204954 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 2 07:53:27.204967 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 2 07:53:27.204980 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 2 07:53:27.204994 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:53:27.205007 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Jul 2 07:53:27.205020 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Jul 2 07:53:27.205033 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Jul 2 07:53:27.205046 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Jul 2 07:53:27.205059 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:53:27.205073 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:53:27.205086 kernel: LSM: Security Framework initializing Jul 2 07:53:27.205099 kernel: SELinux: Initializing. Jul 2 07:53:27.205115 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:27.205142 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:27.205156 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Jul 2 07:53:27.205169 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 2 07:53:27.205183 kernel: signal: max sigframe size: 3632 Jul 2 07:53:27.205197 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:53:27.205210 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:53:27.205224 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:53:27.205237 kernel: x86: Booting SMP configuration: Jul 2 07:53:27.205250 kernel: .... node #0, CPUs: #1 Jul 2 07:53:27.205267 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Jul 2 07:53:27.205282 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:53:27.205296 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:53:27.205309 kernel: smpboot: Max logical packages: 1 Jul 2 07:53:27.205323 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Jul 2 07:53:27.205336 kernel: devtmpfs: initialized Jul 2 07:53:27.205350 kernel: x86/mm: Memory block size: 128MB Jul 2 07:53:27.205363 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Jul 2 07:53:27.205380 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:53:27.205393 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:53:27.205406 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:53:27.205420 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:53:27.205433 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:53:27.205447 kernel: audit: type=2000 audit(1719906806.028:1): state=initialized audit_enabled=0 res=1 Jul 2 07:53:27.205461 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:53:27.205474 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:53:27.205487 kernel: cpuidle: using governor menu Jul 2 07:53:27.205504 kernel: ACPI: bus type PCI registered Jul 2 07:53:27.205518 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:53:27.205531 kernel: dca service started, version 1.12.1 Jul 2 07:53:27.205545 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:53:27.205558 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:53:27.205572 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:53:27.205585 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:53:27.205599 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:53:27.205613 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:53:27.205629 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:53:27.205643 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:53:27.205656 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:53:27.205670 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:53:27.205683 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:53:27.205696 kernel: ACPI: Interpreter enabled Jul 2 07:53:27.205710 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:53:27.205723 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:53:27.205737 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:53:27.205753 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Jul 2 07:53:27.205767 kernel: iommu: Default domain type: Translated Jul 2 07:53:27.205780 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:53:27.205794 kernel: vgaarb: loaded Jul 2 07:53:27.205807 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:53:27.205821 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:53:27.205834 kernel: PTP clock support registered Jul 2 07:53:27.205848 kernel: Registered efivars operations Jul 2 07:53:27.205862 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:53:27.205875 kernel: PCI: System does not support PCI Jul 2 07:53:27.205892 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Jul 2 07:53:27.205905 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:53:27.205918 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:53:27.205932 kernel: pnp: PnP ACPI init Jul 2 07:53:27.205945 kernel: pnp: PnP ACPI: found 3 devices Jul 2 07:53:27.205958 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:53:27.205972 kernel: NET: Registered PF_INET protocol family Jul 2 07:53:27.205986 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:53:27.206002 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:53:27.206016 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:53:27.206030 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:53:27.206043 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:53:27.206056 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:53:27.206070 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:27.206083 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:27.206097 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:53:27.206109 kernel: NET: Registered PF_XDP protocol family Jul 2 07:53:27.206143 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:53:27.206156 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:53:27.206170 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Jul 2 07:53:27.206183 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:53:27.206197 kernel: Initialise system trusted keyrings Jul 2 07:53:27.206211 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:53:27.206224 kernel: Key type asymmetric registered Jul 2 07:53:27.206237 kernel: Asymmetric key parser 'x509' registered Jul 2 07:53:27.206250 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:53:27.206266 kernel: io scheduler mq-deadline registered Jul 2 07:53:27.206279 kernel: io scheduler kyber registered Jul 2 07:53:27.206292 kernel: io scheduler bfq registered Jul 2 07:53:27.206306 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:53:27.206319 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:53:27.206332 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:53:27.206346 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:53:27.206360 kernel: i8042: PNP: No PS/2 controller found. Jul 2 07:53:27.206542 kernel: rtc_cmos 00:02: registered as rtc0 Jul 2 07:53:27.206651 kernel: rtc_cmos 00:02: setting system clock to 2024-07-02T07:53:26 UTC (1719906806) Jul 2 07:53:27.206748 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Jul 2 07:53:27.206763 kernel: fail to initialize ptp_kvm Jul 2 07:53:27.206776 kernel: intel_pstate: CPU model not supported Jul 2 07:53:27.206788 kernel: efifb: probing for efifb Jul 2 07:53:27.206801 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 07:53:27.206814 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 07:53:27.206826 kernel: efifb: scrolling: redraw Jul 2 07:53:27.206841 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 07:53:27.206853 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:53:27.206867 kernel: fb0: EFI VGA frame buffer device Jul 2 07:53:27.206879 kernel: pstore: Registered efi as persistent store backend Jul 2 07:53:27.206892 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:53:27.206904 kernel: Segment Routing with IPv6 Jul 2 07:53:27.206917 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:53:27.206929 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:53:27.206942 kernel: Key type dns_resolver registered Jul 2 07:53:27.206956 kernel: IPI shorthand broadcast: enabled Jul 2 07:53:27.206968 kernel: sched_clock: Marking stable (1039202500, 28963900)->(1408605300, -340438900) Jul 2 07:53:27.206981 kernel: registered taskstats version 1 Jul 2 07:53:27.206993 kernel: Loading compiled-in X.509 certificates Jul 2 07:53:27.207005 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:53:27.207018 kernel: Key type .fscrypt registered Jul 2 07:53:27.207030 kernel: Key type fscrypt-provisioning registered Jul 2 07:53:27.207043 kernel: pstore: Using crash dump compression: deflate Jul 2 07:53:27.207058 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:53:27.207070 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:53:27.207244 kernel: ima: No architecture policies found Jul 2 07:53:27.207260 kernel: clk: Disabling unused clocks Jul 2 07:53:27.207273 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:53:27.207286 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:53:27.207299 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:53:27.207311 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:53:27.207324 kernel: Run /init as init process Jul 2 07:53:27.207337 kernel: with arguments: Jul 2 07:53:27.207355 kernel: /init Jul 2 07:53:27.207367 kernel: with environment: Jul 2 07:53:27.207379 kernel: HOME=/ Jul 2 07:53:27.207391 kernel: TERM=linux Jul 2 07:53:27.207403 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:53:27.207419 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:27.207434 systemd[1]: Detected virtualization microsoft. Jul 2 07:53:27.207449 systemd[1]: Detected architecture x86-64. Jul 2 07:53:27.207462 systemd[1]: Running in initrd. Jul 2 07:53:27.207473 systemd[1]: No hostname configured, using default hostname. Jul 2 07:53:27.207485 systemd[1]: Hostname set to . Jul 2 07:53:27.207498 systemd[1]: Initializing machine ID from random generator. Jul 2 07:53:27.207512 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:53:27.207525 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:27.207538 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:27.207560 systemd[1]: Reached target paths.target. Jul 2 07:53:27.207584 systemd[1]: Reached target slices.target. Jul 2 07:53:27.207597 systemd[1]: Reached target swap.target. Jul 2 07:53:27.207612 systemd[1]: Reached target timers.target. Jul 2 07:53:27.207627 systemd[1]: Listening on iscsid.socket. Jul 2 07:53:27.207641 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:53:27.207654 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:53:27.207669 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:53:27.207686 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:53:27.207701 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:27.207714 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:27.207729 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:27.207743 systemd[1]: Reached target sockets.target. Jul 2 07:53:27.207758 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:27.207772 systemd[1]: Finished network-cleanup.service. Jul 2 07:53:27.207786 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:53:27.207800 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:27.207816 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:27.207826 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:27.207839 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:53:27.207859 systemd-journald[183]: Journal started Jul 2 07:53:27.207943 systemd-journald[183]: Runtime Journal (/run/log/journal/a6992745d8fd4803823992ce525f35f2) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:53:27.204013 systemd-modules-load[184]: Inserted module 'overlay' Jul 2 07:53:27.242249 systemd[1]: Started systemd-journald.service. Jul 2 07:53:27.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.257753 kernel: audit: type=1130 audit(1719906807.243:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.243736 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:27.258092 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:53:27.263312 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:53:27.278144 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:53:27.279240 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:53:27.282156 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:27.293426 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:27.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.314401 kernel: audit: type=1130 audit(1719906807.257:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.320145 kernel: Bridge firewalling registered Jul 2 07:53:27.320986 systemd-modules-load[184]: Inserted module 'br_netfilter' Jul 2 07:53:27.324695 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:53:27.327936 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:53:27.336951 systemd-resolved[185]: Positive Trust Anchors: Jul 2 07:53:27.339979 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:27.354984 kernel: audit: type=1130 audit(1719906807.262:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.355773 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:27.370887 dracut-cmdline[200]: dracut-dracut-053 Jul 2 07:53:27.370887 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:27.422113 kernel: SCSI subsystem initialized Jul 2 07:53:27.422148 kernel: audit: type=1130 audit(1719906807.277:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.422177 kernel: audit: type=1130 audit(1719906807.293:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.405153 systemd-resolved[185]: Defaulting to hostname 'linux'. Jul 2 07:53:27.406419 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:27.409379 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:27.451677 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:53:27.451747 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:53:27.464748 kernel: audit: type=1130 audit(1719906807.326:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.464781 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:53:27.464794 kernel: audit: type=1130 audit(1719906807.409:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.487727 systemd-modules-load[184]: Inserted module 'dm_multipath' Jul 2 07:53:27.491181 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:27.497602 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:27.514380 kernel: audit: type=1130 audit(1719906807.496:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.514434 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:53:27.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.528868 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:27.546980 kernel: audit: type=1130 audit(1719906807.531:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.555148 kernel: iscsi: registered transport (tcp) Jul 2 07:53:27.582410 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:53:27.582494 kernel: QLogic iSCSI HBA Driver Jul 2 07:53:27.612654 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:53:27.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.618642 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:53:27.676163 kernel: raid6: avx512x4 gen() 18309 MB/s Jul 2 07:53:27.698252 kernel: raid6: avx512x4 xor() 5149 MB/s Jul 2 07:53:27.721181 kernel: raid6: avx512x2 gen() 10974 MB/s Jul 2 07:53:27.743179 kernel: raid6: avx512x2 xor() 17605 MB/s Jul 2 07:53:27.767160 kernel: raid6: avx512x1 gen() 17065 MB/s Jul 2 07:53:27.788177 kernel: raid6: avx512x1 xor() 19924 MB/s Jul 2 07:53:27.808175 kernel: raid6: avx2x4 gen() 15004 MB/s Jul 2 07:53:27.829175 kernel: raid6: avx2x4 xor() 6219 MB/s Jul 2 07:53:27.849171 kernel: raid6: avx2x2 gen() 17582 MB/s Jul 2 07:53:27.869166 kernel: raid6: avx2x2 xor() 20416 MB/s Jul 2 07:53:27.895162 kernel: raid6: avx2x1 gen() 12490 MB/s Jul 2 07:53:27.916156 kernel: raid6: avx2x1 xor() 16794 MB/s Jul 2 07:53:27.936161 kernel: raid6: sse2x4 gen() 9968 MB/s Jul 2 07:53:27.957155 kernel: raid6: sse2x4 xor() 5670 MB/s Jul 2 07:53:27.977160 kernel: raid6: sse2x2 gen() 11147 MB/s Jul 2 07:53:27.999646 kernel: raid6: sse2x2 xor() 5749 MB/s Jul 2 07:53:28.021156 kernel: raid6: sse2x1 gen() 10044 MB/s Jul 2 07:53:28.045268 kernel: raid6: sse2x1 xor() 5711 MB/s Jul 2 07:53:28.045305 kernel: raid6: using algorithm avx512x4 gen() 18309 MB/s Jul 2 07:53:28.045316 kernel: raid6: .... xor() 5149 MB/s, rmw enabled Jul 2 07:53:28.049155 kernel: raid6: using avx512x2 recovery algorithm Jul 2 07:53:28.070152 kernel: xor: automatically using best checksumming function avx Jul 2 07:53:28.167154 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:53:28.175417 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:53:28.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.180000 audit: BPF prog-id=7 op=LOAD Jul 2 07:53:28.180000 audit: BPF prog-id=8 op=LOAD Jul 2 07:53:28.181579 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:28.197803 systemd-udevd[384]: Using default interface naming scheme 'v252'. Jul 2 07:53:28.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.202630 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:28.206537 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:53:28.226231 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Jul 2 07:53:28.259669 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:53:28.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.265737 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:28.301396 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:28.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.360670 kernel: hv_vmbus: Vmbus version:5.2 Jul 2 07:53:28.360730 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:53:28.393144 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 07:53:28.407280 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 07:53:28.412140 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:53:28.416152 kernel: AES CTR mode by8 optimization enabled Jul 2 07:53:28.431859 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 07:53:28.438142 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 07:53:28.444513 kernel: scsi host0: storvsc_host_t Jul 2 07:53:28.444597 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 07:53:28.444610 kernel: scsi host1: storvsc_host_t Jul 2 07:53:28.448186 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 07:53:28.462152 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 07:53:28.484143 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 07:53:28.498581 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 07:53:28.498831 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 07:53:28.498964 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 07:53:28.498981 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 07:53:28.502140 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 07:53:28.511147 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 07:53:28.519146 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 07:53:28.524139 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:28.528135 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 07:53:28.543858 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 07:53:28.544107 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 07:53:28.545874 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 07:53:28.636856 kernel: hv_netvsc 000d3ada-4003-000d-3ada-4003000d3ada eth0: VF slot 1 added Jul 2 07:53:28.660373 kernel: hv_vmbus: registering driver hv_pci Jul 2 07:53:28.680513 kernel: hv_pci cc3fb829-567a-4c65-85be-7e9a1abe7208: PCI VMBus probing: Using version 0x10004 Jul 2 07:53:28.680807 kernel: hv_pci cc3fb829-567a-4c65-85be-7e9a1abe7208: PCI host bridge to bus 567a:00 Jul 2 07:53:28.691291 kernel: pci_bus 567a:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Jul 2 07:53:28.691528 kernel: pci_bus 567a:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 07:53:28.703240 kernel: pci 567a:00:02.0: [15b3:1016] type 00 class 0x020000 Jul 2 07:53:28.717038 kernel: pci 567a:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:53:28.736328 kernel: pci 567a:00:02.0: enabling Extended Tags Jul 2 07:53:28.761581 kernel: pci 567a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 567a:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Jul 2 07:53:28.775561 kernel: pci_bus 567a:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 07:53:28.775813 kernel: pci 567a:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:53:28.880161 kernel: mlx5_core 567a:00:02.0: firmware version: 14.30.1284 Jul 2 07:53:29.005417 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:53:29.046150 kernel: mlx5_core 567a:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 07:53:29.066150 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (442) Jul 2 07:53:29.083984 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:29.140864 kernel: mlx5_core 567a:00:02.0: Supported tc offload range - chains: 1, prios: 1 Jul 2 07:53:29.141154 kernel: mlx5_core 567a:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Jul 2 07:53:29.153287 kernel: hv_netvsc 000d3ada-4003-000d-3ada-4003000d3ada eth0: VF registering: eth1 Jul 2 07:53:29.153539 kernel: mlx5_core 567a:00:02.0 eth1: joined to eth0 Jul 2 07:53:29.168147 kernel: mlx5_core 567a:00:02.0 enP22138s1: renamed from eth1 Jul 2 07:53:29.256358 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:53:29.260645 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:53:29.275181 systemd[1]: Starting disk-uuid.service... Jul 2 07:53:29.407616 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:53:30.310158 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:30.310826 disk-uuid[556]: The operation has completed successfully. Jul 2 07:53:30.439752 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:53:30.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:30.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:30.440049 systemd[1]: Finished disk-uuid.service. Jul 2 07:53:30.466118 systemd[1]: Starting verity-setup.service... Jul 2 07:53:30.512260 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:53:30.932634 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:53:30.937956 systemd[1]: Finished verity-setup.service. Jul 2 07:53:30.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:30.943358 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:53:31.031225 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:31.032822 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:53:31.040777 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:53:31.047693 systemd[1]: Starting ignition-setup.service... Jul 2 07:53:31.053695 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:53:31.075970 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:31.076042 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:31.076055 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:31.128725 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:53:31.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.135000 audit: BPF prog-id=9 op=LOAD Jul 2 07:53:31.138821 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:31.149929 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 2 07:53:31.149958 kernel: audit: type=1334 audit(1719906811.135:22): prog-id=9 op=LOAD Jul 2 07:53:31.154655 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:53:31.177077 systemd-networkd[826]: lo: Link UP Jul 2 07:53:31.177085 systemd-networkd[826]: lo: Gained carrier Jul 2 07:53:31.177674 systemd-networkd[826]: Enumeration completed Jul 2 07:53:31.201986 kernel: audit: type=1130 audit(1719906811.182:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.178248 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:31.181447 systemd-networkd[826]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:31.184619 systemd[1]: Reached target network.target. Jul 2 07:53:31.199008 systemd[1]: Starting iscsiuio.service... Jul 2 07:53:31.216213 systemd[1]: Started iscsiuio.service. Jul 2 07:53:31.233240 kernel: audit: type=1130 audit(1719906811.218:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.231507 systemd[1]: Starting iscsid.service... Jul 2 07:53:31.235455 systemd[1]: Finished ignition-setup.service. Jul 2 07:53:31.244675 iscsid[836]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:31.244675 iscsid[836]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:53:31.244675 iscsid[836]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:53:31.244675 iscsid[836]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:53:31.244675 iscsid[836]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:53:31.244675 iscsid[836]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:31.244675 iscsid[836]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:53:31.311231 kernel: audit: type=1130 audit(1719906811.244:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.311268 kernel: audit: type=1130 audit(1719906811.256:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.311285 kernel: mlx5_core 567a:00:02.0 enP22138s1: Link up Jul 2 07:53:31.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.244857 systemd[1]: Started iscsid.service. Jul 2 07:53:31.258390 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:53:31.316299 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:53:31.321270 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:53:31.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.325689 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:53:31.351682 kernel: audit: type=1130 audit(1719906811.325:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.351717 kernel: hv_netvsc 000d3ada-4003-000d-3ada-4003000d3ada eth0: Data path switched to VF: enP22138s1 Jul 2 07:53:31.351956 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:53:31.346937 systemd-networkd[826]: enP22138s1: Link UP Jul 2 07:53:31.347030 systemd-networkd[826]: eth0: Link UP Jul 2 07:53:31.352445 systemd-networkd[826]: eth0: Gained carrier Jul 2 07:53:31.356315 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:31.358652 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:31.364559 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:53:31.375033 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:53:31.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.377906 systemd-networkd[826]: enP22138s1: Gained carrier Jul 2 07:53:31.394996 kernel: audit: type=1130 audit(1719906811.377:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:31.428280 systemd-networkd[826]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:53:32.474410 systemd-networkd[826]: eth0: Gained IPv6LL Jul 2 07:53:34.984582 ignition[845]: Ignition 2.14.0 Jul 2 07:53:34.984598 ignition[845]: Stage: fetch-offline Jul 2 07:53:34.984679 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:34.984724 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:35.079417 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:35.079968 ignition[845]: parsed url from cmdline: "" Jul 2 07:53:35.079977 ignition[845]: no config URL provided Jul 2 07:53:35.079985 ignition[845]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:35.079998 ignition[845]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:35.131454 kernel: audit: type=1130 audit(1719906815.105:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.091307 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:53:35.080051 ignition[845]: failed to fetch config: resource requires networking Jul 2 07:53:35.126604 systemd[1]: Starting ignition-fetch.service... Jul 2 07:53:35.082565 ignition[845]: Ignition finished successfully Jul 2 07:53:35.152300 ignition[856]: Ignition 2.14.0 Jul 2 07:53:35.152312 ignition[856]: Stage: fetch Jul 2 07:53:35.152479 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:35.152514 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:35.165742 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:35.166600 ignition[856]: parsed url from cmdline: "" Jul 2 07:53:35.166605 ignition[856]: no config URL provided Jul 2 07:53:35.166614 ignition[856]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:35.166626 ignition[856]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:35.166665 ignition[856]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 07:53:35.257858 ignition[856]: GET result: OK Jul 2 07:53:35.258056 ignition[856]: config has been read from IMDS userdata Jul 2 07:53:35.258103 ignition[856]: parsing config with SHA512: 7fb315cf0c04c3fcb82b6855ab810db0f75376ce6725d62d285e6a28a1e611d0707304248836fb3c51c2c1d441997bebcc37b10294fb7b36cf2de1e084edbebe Jul 2 07:53:35.262850 unknown[856]: fetched base config from "system" Jul 2 07:53:35.262858 unknown[856]: fetched base config from "system" Jul 2 07:53:35.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.263528 ignition[856]: fetch: fetch complete Jul 2 07:53:35.262866 unknown[856]: fetched user config from "azure" Jul 2 07:53:35.263536 ignition[856]: fetch: fetch passed Jul 2 07:53:35.287284 kernel: audit: type=1130 audit(1719906815.273:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.265070 systemd[1]: Finished ignition-fetch.service. Jul 2 07:53:35.263590 ignition[856]: Ignition finished successfully Jul 2 07:53:35.274812 systemd[1]: Starting ignition-kargs.service... Jul 2 07:53:35.303685 ignition[862]: Ignition 2.14.0 Jul 2 07:53:35.303697 ignition[862]: Stage: kargs Jul 2 07:53:35.303858 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:35.303897 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:35.331710 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:35.333002 ignition[862]: kargs: kargs passed Jul 2 07:53:35.352036 kernel: audit: type=1130 audit(1719906815.335:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.335446 systemd[1]: Finished ignition-kargs.service. Jul 2 07:53:35.333058 ignition[862]: Ignition finished successfully Jul 2 07:53:35.336617 systemd[1]: Starting ignition-disks.service... Jul 2 07:53:35.359953 ignition[868]: Ignition 2.14.0 Jul 2 07:53:35.359962 ignition[868]: Stage: disks Jul 2 07:53:35.360114 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:35.360162 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:35.364500 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:35.367431 ignition[868]: disks: disks passed Jul 2 07:53:35.367510 ignition[868]: Ignition finished successfully Jul 2 07:53:35.374744 systemd[1]: Finished ignition-disks.service. Jul 2 07:53:35.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.379236 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:53:35.384341 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:35.389021 systemd[1]: Reached target local-fs.target. Jul 2 07:53:35.393387 systemd[1]: Reached target sysinit.target. Jul 2 07:53:35.397678 systemd[1]: Reached target basic.target. Jul 2 07:53:35.403046 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:53:35.475218 systemd-fsck[876]: ROOT: clean, 614/7326000 files, 481076/7359488 blocks Jul 2 07:53:35.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:35.481371 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:53:35.487976 systemd[1]: Mounting sysroot.mount... Jul 2 07:53:35.511144 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:35.512256 systemd[1]: Mounted sysroot.mount. Jul 2 07:53:35.516418 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:53:35.559061 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:53:35.566387 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 07:53:35.574387 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:53:35.574933 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:53:35.586455 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:53:35.645519 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:35.652190 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:53:35.663072 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (887) Jul 2 07:53:35.678698 initrd-setup-root[892]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:53:35.687021 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:35.687062 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:35.687076 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:35.690503 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:35.707689 initrd-setup-root[918]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:53:35.733635 initrd-setup-root[926]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:53:35.744630 initrd-setup-root[934]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:53:36.251643 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:53:36.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.259724 systemd[1]: Starting ignition-mount.service... Jul 2 07:53:36.298028 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 07:53:36.298065 kernel: audit: type=1130 audit(1719906816.258:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.299399 systemd[1]: Starting sysroot-boot.service... Jul 2 07:53:36.308787 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:36.308891 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:36.348201 systemd[1]: Finished sysroot-boot.service. Jul 2 07:53:36.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.370158 kernel: audit: type=1130 audit(1719906816.354:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.395459 ignition[956]: INFO : Ignition 2.14.0 Jul 2 07:53:36.395459 ignition[956]: INFO : Stage: mount Jul 2 07:53:36.401072 ignition[956]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:36.401072 ignition[956]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:36.424669 ignition[956]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:36.430355 ignition[956]: INFO : mount: mount passed Jul 2 07:53:36.433708 ignition[956]: INFO : Ignition finished successfully Jul 2 07:53:36.434961 systemd[1]: Finished ignition-mount.service. Jul 2 07:53:36.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.458146 kernel: audit: type=1130 audit(1719906816.440:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.221710 coreos-metadata[886]: Jul 02 07:53:37.221 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 07:53:37.240509 coreos-metadata[886]: Jul 02 07:53:37.240 INFO Fetch successful Jul 2 07:53:37.297757 coreos-metadata[886]: Jul 02 07:53:37.297 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 07:53:37.314801 coreos-metadata[886]: Jul 02 07:53:37.314 INFO Fetch successful Jul 2 07:53:37.335803 coreos-metadata[886]: Jul 02 07:53:37.335 INFO wrote hostname ci-3510.3.5-a-195c2606d4 to /sysroot/etc/hostname Jul 2 07:53:37.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.337763 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 07:53:37.386630 kernel: audit: type=1130 audit(1719906817.347:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.352455 systemd[1]: Starting ignition-files.service... Jul 2 07:53:37.383347 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:37.413915 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (965) Jul 2 07:53:37.413990 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:37.414003 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:37.424493 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:37.430597 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:37.446866 ignition[984]: INFO : Ignition 2.14.0 Jul 2 07:53:37.446866 ignition[984]: INFO : Stage: files Jul 2 07:53:37.452733 ignition[984]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:37.452733 ignition[984]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:37.470931 ignition[984]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:37.484168 ignition[984]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:53:37.488935 ignition[984]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:53:37.488935 ignition[984]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:53:37.539408 ignition[984]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:53:37.544697 ignition[984]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:53:37.558052 unknown[984]: wrote ssh authorized keys file for user: core Jul 2 07:53:37.563234 ignition[984]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:53:37.574774 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:37.583696 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:53:37.734339 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 07:53:37.856433 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:53:37.865710 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:37.951238 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (984) Jul 2 07:53:37.893722 systemd[1]: mnt-oem3861829476.mount: Deactivated successfully. Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3861829476" Jul 2 07:53:37.954343 ignition[984]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3861829476": device or resource busy Jul 2 07:53:37.954343 ignition[984]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3861829476", trying btrfs: device or resource busy Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3861829476" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3861829476" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3861829476" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3861829476" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2846473256" Jul 2 07:53:37.954343 ignition[984]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2846473256": device or resource busy Jul 2 07:53:37.954343 ignition[984]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2846473256", trying btrfs: device or resource busy Jul 2 07:53:37.954343 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2846473256" Jul 2 07:53:37.916678 systemd[1]: mnt-oem2846473256.mount: Deactivated successfully. Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2846473256" Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2846473256" Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2846473256" Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:38.069333 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1 Jul 2 07:53:38.552588 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Jul 2 07:53:38.986931 ignition[984]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:38.986931 ignition[984]: INFO : files: op(13): [started] processing unit "nvidia.service" Jul 2 07:53:38.986931 ignition[984]: INFO : files: op(13): [finished] processing unit "nvidia.service" Jul 2 07:53:38.986931 ignition[984]: INFO : files: op(14): [started] processing unit "waagent.service" Jul 2 07:53:38.986931 ignition[984]: INFO : files: op(14): [finished] processing unit "waagent.service" Jul 2 07:53:38.986931 ignition[984]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:39.019680 ignition[984]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:39.019680 ignition[984]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:39.019680 ignition[984]: INFO : files: files passed Jul 2 07:53:39.019680 ignition[984]: INFO : Ignition finished successfully Jul 2 07:53:39.160404 kernel: audit: type=1130 audit(1719906819.064:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.160451 kernel: audit: type=1130 audit(1719906819.119:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.160471 kernel: audit: type=1131 audit(1719906819.119:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.059163 systemd[1]: Finished ignition-files.service. Jul 2 07:53:39.091773 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:53:39.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.093641 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:53:39.186188 kernel: audit: type=1130 audit(1719906819.168:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.186291 initrd-setup-root-after-ignition[1009]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:53:39.099465 systemd[1]: Starting ignition-quench.service... Jul 2 07:53:39.113968 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:53:39.114067 systemd[1]: Finished ignition-quench.service. Jul 2 07:53:39.164131 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:53:39.169056 systemd[1]: Reached target ignition-complete.target. Jul 2 07:53:39.209812 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:53:39.230363 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:53:39.233435 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:53:39.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.240533 systemd[1]: Reached target initrd-fs.target. Jul 2 07:53:39.286030 kernel: audit: type=1130 audit(1719906819.238:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.286064 kernel: audit: type=1131 audit(1719906819.238:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.278265 systemd[1]: Reached target initrd.target. Jul 2 07:53:39.291550 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:53:39.295479 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:53:39.314833 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:53:39.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.321384 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:53:39.339458 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:53:39.342521 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:53:39.350662 systemd[1]: Stopped target timers.target. Jul 2 07:53:39.356423 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:53:39.358260 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:53:39.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.367752 systemd[1]: Stopped target initrd.target. Jul 2 07:53:39.373019 systemd[1]: Stopped target basic.target. Jul 2 07:53:39.380154 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:53:39.388094 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:53:39.393315 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:53:39.400440 systemd[1]: Stopped target remote-fs.target. Jul 2 07:53:39.407479 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:53:39.413016 systemd[1]: Stopped target sysinit.target. Jul 2 07:53:39.418603 systemd[1]: Stopped target local-fs.target. Jul 2 07:53:39.425777 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:53:39.431402 systemd[1]: Stopped target swap.target. Jul 2 07:53:39.435895 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:53:39.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.437756 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:53:39.442092 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:53:39.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.448689 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:53:39.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.449420 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:53:39.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.455168 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:53:39.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.455320 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:53:39.461568 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:53:39.461744 systemd[1]: Stopped ignition-files.service. Jul 2 07:53:39.468295 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:53:39.468977 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 07:53:39.476614 systemd[1]: Stopping ignition-mount.service... Jul 2 07:53:39.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.485818 systemd[1]: Stopping iscsiuio.service... Jul 2 07:53:39.532377 ignition[1022]: INFO : Ignition 2.14.0 Jul 2 07:53:39.532377 ignition[1022]: INFO : Stage: umount Jul 2 07:53:39.532377 ignition[1022]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:39.532377 ignition[1022]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:39.503577 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:53:39.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.566307 ignition[1022]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:39.566307 ignition[1022]: INFO : umount: umount passed Jul 2 07:53:39.566307 ignition[1022]: INFO : Ignition finished successfully Jul 2 07:53:39.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.515703 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:53:39.515932 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:53:39.528189 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:53:39.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.530020 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:53:39.565879 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:53:39.566014 systemd[1]: Stopped iscsiuio.service. Jul 2 07:53:39.579449 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:53:39.579543 systemd[1]: Stopped ignition-mount.service. Jul 2 07:53:39.587219 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:53:39.587333 systemd[1]: Stopped ignition-disks.service. Jul 2 07:53:39.601303 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:53:39.601377 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:53:39.608866 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:53:39.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.608946 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:53:39.641138 systemd[1]: Stopped target network.target. Jul 2 07:53:39.648735 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:53:39.648906 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:53:39.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.665523 systemd[1]: Stopped target paths.target. Jul 2 07:53:39.669834 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:53:39.674247 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:53:39.683876 systemd[1]: Stopped target slices.target. Jul 2 07:53:39.686678 systemd[1]: Stopped target sockets.target. Jul 2 07:53:39.693841 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:53:39.693881 systemd[1]: Closed iscsid.socket. Jul 2 07:53:39.704825 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:53:39.704890 systemd[1]: Closed iscsiuio.socket. Jul 2 07:53:39.713466 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:53:39.718973 systemd[1]: Stopped ignition-setup.service. Jul 2 07:53:39.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.722023 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:53:39.725893 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:53:39.734696 systemd-networkd[826]: eth0: DHCPv6 lease lost Jul 2 07:53:39.737675 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:53:39.753494 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:53:39.757876 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:53:39.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.763825 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:53:39.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.763960 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:53:39.776322 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:53:39.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.776540 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:53:39.788000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:53:39.788000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:53:39.788996 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:53:39.789041 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:53:39.808903 systemd[1]: Stopping network-cleanup.service... Jul 2 07:53:39.813999 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:53:39.814100 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:53:39.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.820774 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:53:39.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.820834 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:53:39.827704 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:53:39.833141 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:53:39.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.837874 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:53:39.841553 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:53:39.846463 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:53:39.846652 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:53:39.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.853814 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:53:39.853872 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:53:39.858978 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:53:39.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.859024 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:53:39.863364 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:53:39.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.863433 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:53:39.868168 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:53:39.894215 kernel: hv_netvsc 000d3ada-4003-000d-3ada-4003000d3ada eth0: Data path switched from VF: enP22138s1 Jul 2 07:53:39.868228 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:53:39.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.873054 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:53:39.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.873106 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:53:39.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.879282 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:53:39.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.891030 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:53:39.894163 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 07:53:39.899262 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:53:39.900355 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:53:39.908745 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:53:39.908819 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:53:39.919484 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:53:39.920014 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:53:39.920105 systemd[1]: Stopped network-cleanup.service. Jul 2 07:53:39.927037 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:53:39.927169 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:53:40.818318 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:53:40.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.818451 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:53:40.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.824068 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:53:40.829982 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:53:40.830062 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:53:40.842537 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:53:40.864305 systemd[1]: Switching root. Jul 2 07:53:40.899273 iscsid[836]: iscsid shutting down. Jul 2 07:53:40.902239 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Jul 2 07:53:40.902321 systemd-journald[183]: Journal stopped Jul 2 07:53:56.957386 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:53:56.957415 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:53:56.957428 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:53:56.957436 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:53:56.957445 kernel: SELinux: policy capability open_perms=1 Jul 2 07:53:56.957453 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:53:56.957462 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:53:56.957474 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:53:56.957482 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:53:56.957489 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:53:56.957497 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:53:56.957505 kernel: kauditd_printk_skb: 37 callbacks suppressed Jul 2 07:53:56.957514 kernel: audit: type=1403 audit(1719906823.634:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:53:56.957526 systemd[1]: Successfully loaded SELinux policy in 330.530ms. Jul 2 07:53:56.957539 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.393ms. Jul 2 07:53:56.957549 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:56.957558 systemd[1]: Detected virtualization microsoft. Jul 2 07:53:56.957567 systemd[1]: Detected architecture x86-64. Jul 2 07:53:56.957575 systemd[1]: Detected first boot. Jul 2 07:53:56.957586 systemd[1]: Hostname set to . Jul 2 07:53:56.957595 systemd[1]: Initializing machine ID from random generator. Jul 2 07:53:56.957604 kernel: audit: type=1400 audit(1719906824.540:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:56.957614 kernel: audit: type=1400 audit(1719906824.561:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:56.957622 kernel: audit: type=1400 audit(1719906824.561:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:56.957631 kernel: audit: type=1334 audit(1719906824.577:85): prog-id=10 op=LOAD Jul 2 07:53:56.957641 kernel: audit: type=1334 audit(1719906824.578:86): prog-id=10 op=UNLOAD Jul 2 07:53:56.957649 kernel: audit: type=1334 audit(1719906824.596:87): prog-id=11 op=LOAD Jul 2 07:53:56.957657 kernel: audit: type=1334 audit(1719906824.596:88): prog-id=11 op=UNLOAD Jul 2 07:53:56.957667 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:53:56.957676 kernel: audit: type=1400 audit(1719906826.249:89): avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:53:56.957685 kernel: audit: type=1300 audit(1719906826.249:89): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:56.957694 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:53:56.957705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:56.957715 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:56.957725 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:56.957734 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:53:56.957742 kernel: audit: type=1334 audit(1719906836.242:91): prog-id=12 op=LOAD Jul 2 07:53:56.957750 kernel: audit: type=1334 audit(1719906836.242:92): prog-id=3 op=UNLOAD Jul 2 07:53:56.957759 kernel: audit: type=1334 audit(1719906836.247:93): prog-id=13 op=LOAD Jul 2 07:53:56.957769 kernel: audit: type=1334 audit(1719906836.252:94): prog-id=14 op=LOAD Jul 2 07:53:56.957778 kernel: audit: type=1334 audit(1719906836.252:95): prog-id=4 op=UNLOAD Jul 2 07:53:56.957789 kernel: audit: type=1334 audit(1719906836.252:96): prog-id=5 op=UNLOAD Jul 2 07:53:56.957798 kernel: audit: type=1334 audit(1719906836.257:97): prog-id=15 op=LOAD Jul 2 07:53:56.957806 kernel: audit: type=1334 audit(1719906836.257:98): prog-id=12 op=UNLOAD Jul 2 07:53:56.957815 kernel: audit: type=1334 audit(1719906836.279:99): prog-id=16 op=LOAD Jul 2 07:53:56.957823 kernel: audit: type=1334 audit(1719906836.284:100): prog-id=17 op=LOAD Jul 2 07:53:56.957832 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:53:56.957841 systemd[1]: Stopped iscsid.service. Jul 2 07:53:56.957853 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:53:56.957865 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:53:56.957874 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:56.957883 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:53:56.957893 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:53:56.957902 systemd[1]: Created slice system-getty.slice. Jul 2 07:53:56.957911 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:53:56.957921 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:53:56.957932 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:53:56.957941 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:53:56.957950 systemd[1]: Created slice user.slice. Jul 2 07:53:56.957959 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:56.957969 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:53:56.957978 systemd[1]: Set up automount boot.automount. Jul 2 07:53:56.957987 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:53:56.957996 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:53:56.958005 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:53:56.958017 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:53:56.958026 systemd[1]: Reached target integritysetup.target. Jul 2 07:53:56.958035 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:56.958045 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:56.958054 systemd[1]: Reached target slices.target. Jul 2 07:53:56.958065 systemd[1]: Reached target swap.target. Jul 2 07:53:56.958074 systemd[1]: Reached target torcx.target. Jul 2 07:53:56.958083 systemd[1]: Reached target veritysetup.target. Jul 2 07:53:56.958094 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:53:56.958104 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:53:56.958114 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:56.958129 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:56.958141 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:56.958151 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:53:56.958160 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:53:56.958170 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:53:56.958179 systemd[1]: Mounting media.mount... Jul 2 07:53:56.958189 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:56.958199 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:53:56.958208 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:53:56.958217 systemd[1]: Mounting tmp.mount... Jul 2 07:53:56.958229 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:53:56.958239 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:56.958248 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:56.958257 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:53:56.958267 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:56.958278 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:56.958287 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:56.958297 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:53:56.958306 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:56.958319 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:53:56.958329 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:53:56.958338 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:53:56.958348 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:53:56.958357 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:53:56.958366 systemd[1]: Stopped systemd-journald.service. Jul 2 07:53:56.958376 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:56.958385 kernel: loop: module loaded Jul 2 07:53:56.958394 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:56.958405 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:53:56.958415 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:53:56.958424 kernel: fuse: init (API version 7.34) Jul 2 07:53:56.958433 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:56.958443 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:53:56.958453 systemd[1]: Stopped verity-setup.service. Jul 2 07:53:56.958462 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:56.958472 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:53:56.958482 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:53:56.958493 systemd[1]: Mounted media.mount. Jul 2 07:53:56.958503 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:53:56.958512 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:53:56.958528 systemd-journald[1156]: Journal started Jul 2 07:53:56.958567 systemd-journald[1156]: Runtime Journal (/run/log/journal/e02e1728478e4b489d5d782736c6d997) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:53:43.634000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:53:44.540000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:44.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:44.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:44.577000 audit: BPF prog-id=10 op=LOAD Jul 2 07:53:44.578000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:53:44.596000 audit: BPF prog-id=11 op=LOAD Jul 2 07:53:44.596000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:53:46.249000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:53:46.249000 audit[1056]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:46.249000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:46.262000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:53:46.262000 audit[1056]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:46.262000 audit: CWD cwd="/" Jul 2 07:53:46.262000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:46.262000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:46.262000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:56.242000 audit: BPF prog-id=12 op=LOAD Jul 2 07:53:56.242000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:53:56.247000 audit: BPF prog-id=13 op=LOAD Jul 2 07:53:56.252000 audit: BPF prog-id=14 op=LOAD Jul 2 07:53:56.252000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:53:56.252000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:53:56.257000 audit: BPF prog-id=15 op=LOAD Jul 2 07:53:56.257000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:53:56.279000 audit: BPF prog-id=16 op=LOAD Jul 2 07:53:56.284000 audit: BPF prog-id=17 op=LOAD Jul 2 07:53:56.284000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:53:56.284000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:53:56.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.306000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:53:56.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.801000 audit: BPF prog-id=18 op=LOAD Jul 2 07:53:56.801000 audit: BPF prog-id=19 op=LOAD Jul 2 07:53:56.801000 audit: BPF prog-id=20 op=LOAD Jul 2 07:53:56.801000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:53:56.801000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:53:56.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.945000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:53:56.945000 audit[1156]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffea39df800 a2=4000 a3=7ffea39df89c items=0 ppid=1 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:56.945000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:53:56.240715 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:53:46.215154 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:56.285138 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:53:46.215564 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:46.215583 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:46.215619 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:53:46.215629 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:53:46.215672 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:53:46.215684 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:53:46.215887 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:53:46.215933 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:46.215946 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:46.231753 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:53:46.231807 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:53:46.231831 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:53:46.231846 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:53:46.231871 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:53:46.231887 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:53:54.860778 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:54.861066 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:54.861228 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:54.861423 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:54.861482 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:53:54.861548 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-07-02T07:53:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:53:56.973898 systemd[1]: Started systemd-journald.service. Jul 2 07:53:56.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.975421 systemd[1]: Mounted tmp.mount. Jul 2 07:53:56.978002 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:53:56.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.981059 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:56.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.984902 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:53:56.985165 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:53:56.989384 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:56.989545 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:56.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.993443 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:56.993762 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:56.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.997474 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:56.997625 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:57.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.001471 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:53:57.001629 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:53:57.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.004955 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:57.005297 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:57.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.009702 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:57.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.013837 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:53:57.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.018632 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:53:57.025650 systemd[1]: Reached target network-pre.target. Jul 2 07:53:57.031190 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:53:57.037143 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:53:57.042895 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:53:57.044675 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:53:57.051932 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:53:57.054967 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:57.056787 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:53:57.065481 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:57.067831 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:57.073514 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:53:57.081300 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:53:57.084185 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:53:57.105337 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:57.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.109218 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:53:57.118943 udevadm[1179]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:53:57.155002 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:53:57.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.157862 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:53:57.164777 systemd-journald[1156]: Time spent on flushing to /var/log/journal/e02e1728478e4b489d5d782736c6d997 is 28.159ms for 1174 entries. Jul 2 07:53:57.164777 systemd-journald[1156]: System Journal (/var/log/journal/e02e1728478e4b489d5d782736c6d997) is 8.0M, max 2.6G, 2.6G free. Jul 2 07:53:57.240387 systemd-journald[1156]: Received client request to flush runtime journal. Jul 2 07:53:57.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.220564 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:57.241674 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:53:57.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.906103 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:53:57.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:57.914749 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:58.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:58.320920 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:58.883324 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:53:58.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:58.887000 audit: BPF prog-id=21 op=LOAD Jul 2 07:53:58.887000 audit: BPF prog-id=22 op=LOAD Jul 2 07:53:58.887000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:53:58.887000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:53:58.888433 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:58.915150 systemd-udevd[1184]: Using default interface naming scheme 'v252'. Jul 2 07:53:59.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.175000 audit: BPF prog-id=23 op=LOAD Jul 2 07:53:59.165365 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:59.177279 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:59.220609 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:53:59.324205 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:53:59.345146 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 07:53:59.361098 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 07:53:59.361218 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 07:53:59.369885 kernel: Console: switching to colour dummy device 80x25 Jul 2 07:53:59.376901 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:53:59.341000 audit[1204]: AVC avc: denied { confidentiality } for pid=1204 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:59.398227 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 07:53:59.398342 kernel: hv_vmbus: registering driver hv_utils Jul 2 07:53:59.405151 kernel: hv_vmbus: registering driver hv_balloon Jul 2 07:53:59.413265 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 07:53:59.413371 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 07:53:59.413397 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 07:54:00.816100 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 07:53:59.341000 audit[1204]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f50bb448c0 a1=f884 a2=7fedd60b9bc5 a3=5 items=12 ppid=1184 pid=1204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:59.341000 audit: CWD cwd="/" Jul 2 07:53:59.341000 audit: PATH item=0 name=(null) inode=237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=1 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=2 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=3 name=(null) inode=15082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=4 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=5 name=(null) inode=15083 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=6 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=7 name=(null) inode=15084 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=8 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=9 name=(null) inode=15085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=10 name=(null) inode=15081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PATH item=11 name=(null) inode=15086 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:59.341000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:54:00.844000 audit: BPF prog-id=24 op=LOAD Jul 2 07:54:00.844000 audit: BPF prog-id=25 op=LOAD Jul 2 07:54:00.844000 audit: BPF prog-id=26 op=LOAD Jul 2 07:54:00.847421 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:54:00.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.919009 systemd[1]: Started systemd-userdbd.service. Jul 2 07:54:00.975832 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1190) Jul 2 07:54:01.002319 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:54:01.051835 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Jul 2 07:54:01.242703 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:54:01.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.249373 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:54:01.502285 systemd-networkd[1196]: lo: Link UP Jul 2 07:54:01.502297 systemd-networkd[1196]: lo: Gained carrier Jul 2 07:54:01.502944 systemd-networkd[1196]: Enumeration completed Jul 2 07:54:01.503094 systemd[1]: Started systemd-networkd.service. Jul 2 07:54:01.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.508029 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:54:01.536198 systemd-networkd[1196]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:54:01.590825 kernel: mlx5_core 567a:00:02.0 enP22138s1: Link up Jul 2 07:54:01.613829 kernel: hv_netvsc 000d3ada-4003-000d-3ada-4003000d3ada eth0: Data path switched to VF: enP22138s1 Jul 2 07:54:01.614028 systemd-networkd[1196]: enP22138s1: Link UP Jul 2 07:54:01.614163 systemd-networkd[1196]: eth0: Link UP Jul 2 07:54:01.614168 systemd-networkd[1196]: eth0: Gained carrier Jul 2 07:54:01.619176 systemd-networkd[1196]: enP22138s1: Gained carrier Jul 2 07:54:01.647984 systemd-networkd[1196]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:54:01.753843 lvm[1261]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:54:01.780078 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:54:01.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.783304 systemd[1]: Reached target cryptsetup.target. Jul 2 07:54:01.787408 systemd[1]: Starting lvm2-activation.service... Jul 2 07:54:01.792410 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:54:01.820085 systemd[1]: Finished lvm2-activation.service. Jul 2 07:54:01.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.822831 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:54:01.825200 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:54:01.825245 systemd[1]: Reached target local-fs.target. Jul 2 07:54:01.827305 systemd[1]: Reached target machines.target. Jul 2 07:54:01.830976 systemd[1]: Starting ldconfig.service... Jul 2 07:54:01.836615 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:01.836746 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:01.838229 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:54:01.843092 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:54:01.849609 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:54:01.856181 systemd[1]: Starting systemd-sysext.service... Jul 2 07:54:01.891751 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1266 (bootctl) Jul 2 07:54:01.892417 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:54:01.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.898095 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:54:01.966496 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:54:02.120452 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:54:02.120746 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:54:02.328839 kernel: loop0: detected capacity change from 0 to 209816 Jul 2 07:54:03.253845 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:54:03.272092 kernel: kauditd_printk_skb: 76 callbacks suppressed Jul 2 07:54:03.272255 kernel: audit: type=1130 audit(1719906843.265:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.262059 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:54:03.262662 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:54:03.289861 kernel: loop1: detected capacity change from 0 to 209816 Jul 2 07:54:03.300784 (sd-sysext)[1278]: Using extensions 'kubernetes'. Jul 2 07:54:03.301309 (sd-sysext)[1278]: Merged extensions into '/usr'. Jul 2 07:54:03.325022 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.328282 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:54:03.331724 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.334140 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:03.344157 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:03.351667 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:03.355908 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.356124 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:03.356303 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.359571 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:54:03.363096 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:03.363266 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:03.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.367540 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:03.367661 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:03.382139 kernel: audit: type=1130 audit(1719906843.365:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.404891 kernel: audit: type=1131 audit(1719906843.365:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.408155 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:03.408278 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:03.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.432552 kernel: audit: type=1130 audit(1719906843.406:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.432708 kernel: audit: type=1131 audit(1719906843.406:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.437016 systemd-networkd[1196]: eth0: Gained IPv6LL Jul 2 07:54:03.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.454025 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:54:03.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.471977 kernel: audit: type=1130 audit(1719906843.449:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.473110 kernel: audit: type=1131 audit(1719906843.449:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.493952 systemd[1]: Finished systemd-sysext.service. Jul 2 07:54:03.516417 kernel: audit: type=1130 audit(1719906843.488:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.520142 systemd[1]: Starting ensure-sysext.service... Jul 2 07:54:03.547295 kernel: audit: type=1130 audit(1719906843.510:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.540586 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:03.540935 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.547640 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:54:03.556133 systemd[1]: Reloading. Jul 2 07:54:03.568346 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:54:03.570123 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:54:03.588624 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:54:03.637774 /usr/lib/systemd/system-generators/torcx-generator[1310]: time="2024-07-02T07:54:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:03.657319 /usr/lib/systemd/system-generators/torcx-generator[1310]: time="2024-07-02T07:54:03Z" level=info msg="torcx already run" Jul 2 07:54:03.665184 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) Jul 2 07:54:03.665184 systemd-fsck[1273]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:54:03.747650 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:03.747672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:03.764456 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:03.829000 audit: BPF prog-id=27 op=LOAD Jul 2 07:54:03.836831 kernel: audit: type=1334 audit(1719906843.829:169): prog-id=27 op=LOAD Jul 2 07:54:03.829000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:54:03.835000 audit: BPF prog-id=28 op=LOAD Jul 2 07:54:03.835000 audit: BPF prog-id=29 op=LOAD Jul 2 07:54:03.835000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:54:03.835000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:54:03.836000 audit: BPF prog-id=30 op=LOAD Jul 2 07:54:03.836000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:54:03.836000 audit: BPF prog-id=31 op=LOAD Jul 2 07:54:03.836000 audit: BPF prog-id=32 op=LOAD Jul 2 07:54:03.836000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:54:03.836000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:54:03.837000 audit: BPF prog-id=33 op=LOAD Jul 2 07:54:03.837000 audit: BPF prog-id=34 op=LOAD Jul 2 07:54:03.837000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:54:03.837000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:54:03.838000 audit: BPF prog-id=35 op=LOAD Jul 2 07:54:03.838000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:54:03.844234 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:54:03.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.857428 systemd[1]: Mounting boot.mount... Jul 2 07:54:03.865533 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.865910 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.868026 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:03.875464 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:03.879475 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:03.883487 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.883750 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:03.884030 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.889217 systemd[1]: Mounted boot.mount. Jul 2 07:54:03.892603 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:03.892779 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:03.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.896138 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:03.896307 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:03.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.899973 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:03.900142 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:03.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.905210 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.905591 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.908662 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:03.913128 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:03.917629 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:03.919927 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.920164 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:03.920390 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.922242 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:54:03.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.925566 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:03.925741 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:03.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.931557 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:03.931733 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:03.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.935146 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:03.935307 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:03.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.940772 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.941174 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.942751 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:54:03.947048 systemd[1]: Starting modprobe@drm.service... Jul 2 07:54:03.950726 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:54:03.954587 systemd[1]: Starting modprobe@loop.service... Jul 2 07:54:03.957019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.957220 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:03.957390 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:54:03.958327 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:54:03.958482 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:54:03.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.961782 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:54:03.961988 systemd[1]: Finished modprobe@drm.service. Jul 2 07:54:03.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.966038 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:54:03.966215 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:54:03.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.970076 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:54:03.970233 systemd[1]: Finished modprobe@loop.service. Jul 2 07:54:03.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.975270 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:54:03.975423 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:54:03.976852 systemd[1]: Finished ensure-sysext.service. Jul 2 07:54:03.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.113609 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:54:04.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.118575 systemd[1]: Starting audit-rules.service... Jul 2 07:54:04.126278 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:54:04.131359 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:54:04.138000 audit: BPF prog-id=36 op=LOAD Jul 2 07:54:04.145000 audit: BPF prog-id=37 op=LOAD Jul 2 07:54:04.143030 systemd[1]: Starting systemd-resolved.service... Jul 2 07:54:04.149160 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:54:04.155470 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:54:04.189000 audit[1389]: SYSTEM_BOOT pid=1389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.196389 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:54:04.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.210564 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:54:04.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.214724 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:54:04.269162 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:54:04.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.322931 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:54:04.327425 systemd[1]: Reached target time-set.target. Jul 2 07:54:04.368722 systemd-resolved[1387]: Positive Trust Anchors: Jul 2 07:54:04.368746 systemd-resolved[1387]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:54:04.368788 systemd-resolved[1387]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:54:04.459500 systemd-resolved[1387]: Using system hostname 'ci-3510.3.5-a-195c2606d4'. Jul 2 07:54:04.461307 systemd[1]: Started systemd-resolved.service. Jul 2 07:54:04.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.464468 systemd[1]: Reached target network.target. Jul 2 07:54:04.468161 systemd[1]: Reached target network-online.target. Jul 2 07:54:04.471423 systemd[1]: Reached target nss-lookup.target. Jul 2 07:54:04.494000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:54:04.494000 audit[1404]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1fc206c0 a2=420 a3=0 items=0 ppid=1383 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.494000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:54:04.497082 augenrules[1404]: No rules Jul 2 07:54:04.499253 systemd[1]: Finished audit-rules.service. Jul 2 07:54:04.546129 systemd-timesyncd[1388]: Contacted time server 188.125.64.7:123 (0.flatcar.pool.ntp.org). Jul 2 07:54:04.546230 systemd-timesyncd[1388]: Initial clock synchronization to Tue 2024-07-02 07:54:04.535320 UTC. Jul 2 07:54:11.153379 ldconfig[1265]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:54:11.164010 systemd[1]: Finished ldconfig.service. Jul 2 07:54:11.169112 systemd[1]: Starting systemd-update-done.service... Jul 2 07:54:11.182419 systemd[1]: Finished systemd-update-done.service. Jul 2 07:54:11.186123 systemd[1]: Reached target sysinit.target. Jul 2 07:54:11.188889 systemd[1]: Started motdgen.path. Jul 2 07:54:11.191406 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:54:11.195877 systemd[1]: Started logrotate.timer. Jul 2 07:54:11.198359 systemd[1]: Started mdadm.timer. Jul 2 07:54:11.200931 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:54:11.205278 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:54:11.205315 systemd[1]: Reached target paths.target. Jul 2 07:54:11.207991 systemd[1]: Reached target timers.target. Jul 2 07:54:11.212270 systemd[1]: Listening on dbus.socket. Jul 2 07:54:11.216197 systemd[1]: Starting docker.socket... Jul 2 07:54:11.223973 systemd[1]: Listening on sshd.socket. Jul 2 07:54:11.227358 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:11.227987 systemd[1]: Listening on docker.socket. Jul 2 07:54:11.232404 systemd[1]: Reached target sockets.target. Jul 2 07:54:11.236782 systemd[1]: Reached target basic.target. Jul 2 07:54:11.241432 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:54:11.241539 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:54:11.244164 systemd[1]: Starting containerd.service... Jul 2 07:54:11.248969 systemd[1]: Starting dbus.service... Jul 2 07:54:11.253035 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:54:11.257844 systemd[1]: Starting extend-filesystems.service... Jul 2 07:54:11.260480 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:54:11.262278 systemd[1]: Starting kubelet.service... Jul 2 07:54:11.266183 systemd[1]: Starting motdgen.service... Jul 2 07:54:11.270577 systemd[1]: Started nvidia.service. Jul 2 07:54:11.275321 systemd[1]: Starting prepare-helm.service... Jul 2 07:54:11.279035 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:54:11.286309 systemd[1]: Starting sshd-keygen.service... Jul 2 07:54:11.292758 systemd[1]: Starting systemd-logind.service... Jul 2 07:54:11.304082 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:54:11.304200 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:54:11.304956 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:54:11.306147 systemd[1]: Starting update-engine.service... Jul 2 07:54:11.316823 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:54:11.329659 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:54:11.330029 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:54:11.379756 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:54:11.380026 systemd[1]: Finished motdgen.service. Jul 2 07:54:11.420045 jq[1414]: false Jul 2 07:54:11.420884 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:54:11.426123 jq[1429]: true Jul 2 07:54:11.421115 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:54:11.429978 extend-filesystems[1415]: Found loop1 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda1 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda2 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda3 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found usr Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda4 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda6 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda7 Jul 2 07:54:11.432224 extend-filesystems[1415]: Found sda9 Jul 2 07:54:11.455654 extend-filesystems[1415]: Checking size of /dev/sda9 Jul 2 07:54:11.460152 jq[1447]: true Jul 2 07:54:11.484507 env[1438]: time="2024-07-02T07:54:11.484434560Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:54:11.507493 systemd-logind[1424]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:54:11.513200 systemd-logind[1424]: New seat seat0. Jul 2 07:54:11.546257 tar[1432]: linux-amd64/helm Jul 2 07:54:11.552145 extend-filesystems[1415]: Old size kept for /dev/sda9 Jul 2 07:54:11.563764 extend-filesystems[1415]: Found sr0 Jul 2 07:54:11.574575 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:54:11.574826 systemd[1]: Finished extend-filesystems.service. Jul 2 07:54:11.635539 env[1438]: time="2024-07-02T07:54:11.635479183Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:54:11.635888 env[1438]: time="2024-07-02T07:54:11.635864609Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639140 env[1438]: time="2024-07-02T07:54:11.639087350Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639140 env[1438]: time="2024-07-02T07:54:11.639137327Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639493 env[1438]: time="2024-07-02T07:54:11.639461081Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639559 env[1438]: time="2024-07-02T07:54:11.639495965Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639559 env[1438]: time="2024-07-02T07:54:11.639516656Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:54:11.639559 env[1438]: time="2024-07-02T07:54:11.639532349Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639680 env[1438]: time="2024-07-02T07:54:11.639639600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.639970 env[1438]: time="2024-07-02T07:54:11.639937565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:54:11.640173 env[1438]: time="2024-07-02T07:54:11.640147670Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:54:11.640225 env[1438]: time="2024-07-02T07:54:11.640175457Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:54:11.640267 env[1438]: time="2024-07-02T07:54:11.640244126Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:54:11.640267 env[1438]: time="2024-07-02T07:54:11.640262118Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:54:11.666939 env[1438]: time="2024-07-02T07:54:11.666844485Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:54:11.667116 env[1438]: time="2024-07-02T07:54:11.666958233Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:54:11.667116 env[1438]: time="2024-07-02T07:54:11.666983322Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:54:11.667116 env[1438]: time="2024-07-02T07:54:11.667065385Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667085076Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667156343Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667177834Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667196125Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667230010Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667249701Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667276289Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.667323 env[1438]: time="2024-07-02T07:54:11.667308275Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:54:11.667608 env[1438]: time="2024-07-02T07:54:11.667476898Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:54:11.667649 env[1438]: time="2024-07-02T07:54:11.667601342Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:54:11.668109 env[1438]: time="2024-07-02T07:54:11.668071129Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:54:11.668214 env[1438]: time="2024-07-02T07:54:11.668126804Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668214 env[1438]: time="2024-07-02T07:54:11.668148194Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:54:11.668294 env[1438]: time="2024-07-02T07:54:11.668209467Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668294 env[1438]: time="2024-07-02T07:54:11.668229857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668294 env[1438]: time="2024-07-02T07:54:11.668249748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668294 env[1438]: time="2024-07-02T07:54:11.668267440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668294 env[1438]: time="2024-07-02T07:54:11.668286832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668466 env[1438]: time="2024-07-02T07:54:11.668304124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668466 env[1438]: time="2024-07-02T07:54:11.668321616Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668466 env[1438]: time="2024-07-02T07:54:11.668338608Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668466 env[1438]: time="2024-07-02T07:54:11.668358099Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:54:11.668622 env[1438]: time="2024-07-02T07:54:11.668524724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668622 env[1438]: time="2024-07-02T07:54:11.668548013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668622 env[1438]: time="2024-07-02T07:54:11.668567205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.668622 env[1438]: time="2024-07-02T07:54:11.668583497Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:54:11.668622 env[1438]: time="2024-07-02T07:54:11.668607087Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:54:11.668810 env[1438]: time="2024-07-02T07:54:11.668624879Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:54:11.668810 env[1438]: time="2024-07-02T07:54:11.668657164Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:54:11.668810 env[1438]: time="2024-07-02T07:54:11.668704043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:54:11.669101 env[1438]: time="2024-07-02T07:54:11.669025397Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:54:11.677132 systemd[1]: Started containerd.service. Jul 2 07:54:11.709109 bash[1469]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.669121854Z" level=info msg="Connect containerd service" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.669173730Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.676506011Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.676894835Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.676956407Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677018279Z" level=info msg="containerd successfully booted in 0.195946s" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677399406Z" level=info msg="Start subscribing containerd event" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677462478Z" level=info msg="Start recovering state" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677534845Z" level=info msg="Start event monitor" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677589220Z" level=info msg="Start snapshots syncer" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677598916Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:54:11.709247 env[1438]: time="2024-07-02T07:54:11.677613909Z" level=info msg="Start streaming server" Jul 2 07:54:11.681953 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:54:11.772206 dbus-daemon[1413]: [system] SELinux support is enabled Jul 2 07:54:11.772413 systemd[1]: Started dbus.service. Jul 2 07:54:11.787044 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:54:11.787086 systemd[1]: Reached target system-config.target. Jul 2 07:54:11.791971 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:54:11.792016 systemd[1]: Reached target user-config.target. Jul 2 07:54:11.795281 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 07:54:11.796524 systemd[1]: Started systemd-logind.service. Jul 2 07:54:11.801960 dbus-daemon[1413]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:54:12.293637 tar[1432]: linux-amd64/LICENSE Jul 2 07:54:12.293844 tar[1432]: linux-amd64/README.md Jul 2 07:54:12.302237 systemd[1]: Finished prepare-helm.service. Jul 2 07:54:12.602883 systemd[1]: Started kubelet.service. Jul 2 07:54:12.738982 update_engine[1426]: I0702 07:54:12.737942 1426 main.cc:92] Flatcar Update Engine starting Jul 2 07:54:12.790844 systemd[1]: Started update-engine.service. Jul 2 07:54:12.796511 systemd[1]: Started locksmithd.service. Jul 2 07:54:12.799721 update_engine[1426]: I0702 07:54:12.799680 1426 update_check_scheduler.cc:74] Next update check in 3m58s Jul 2 07:54:13.404259 kubelet[1518]: E0702 07:54:13.404173 1518 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:13.406436 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:13.406616 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:13.406959 systemd[1]: kubelet.service: Consumed 1.169s CPU time. Jul 2 07:54:13.458275 sshd_keygen[1435]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:54:13.480269 systemd[1]: Finished sshd-keygen.service. Jul 2 07:54:13.484810 systemd[1]: Starting issuegen.service... Jul 2 07:54:13.488540 systemd[1]: Started waagent.service. Jul 2 07:54:13.492189 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:54:13.492479 systemd[1]: Finished issuegen.service. Jul 2 07:54:13.496303 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:54:13.505240 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:54:13.516042 systemd[1]: Started getty@tty1.service. Jul 2 07:54:13.520177 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:54:13.523211 systemd[1]: Reached target getty.target. Jul 2 07:54:13.525695 systemd[1]: Reached target multi-user.target. Jul 2 07:54:13.529806 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:54:13.540238 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:54:13.540443 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:54:13.543216 systemd[1]: Startup finished in 997ms (firmware) + 34.231s (loader) + 1.251s (kernel) + 16.316s (initrd) + 29.067s (userspace) = 1min 21.863s. Jul 2 07:54:13.956203 login[1542]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:54:13.959814 login[1543]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:54:13.984630 systemd[1]: Created slice user-500.slice. Jul 2 07:54:13.986280 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:54:13.990651 systemd-logind[1424]: New session 2 of user core. Jul 2 07:54:13.995660 systemd-logind[1424]: New session 1 of user core. Jul 2 07:54:14.000274 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:54:14.003155 systemd[1]: Starting user@500.service... Jul 2 07:54:14.026284 (systemd)[1546]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:14.166098 systemd[1546]: Queued start job for default target default.target. Jul 2 07:54:14.166733 systemd[1546]: Reached target paths.target. Jul 2 07:54:14.166762 systemd[1546]: Reached target sockets.target. Jul 2 07:54:14.166779 systemd[1546]: Reached target timers.target. Jul 2 07:54:14.166793 systemd[1546]: Reached target basic.target. Jul 2 07:54:14.166863 systemd[1546]: Reached target default.target. Jul 2 07:54:14.166902 systemd[1546]: Startup finished in 133ms. Jul 2 07:54:14.166946 systemd[1]: Started user@500.service. Jul 2 07:54:14.168055 systemd[1]: Started session-1.scope. Jul 2 07:54:14.168584 systemd[1]: Started session-2.scope. Jul 2 07:54:14.633590 locksmithd[1524]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:54:21.346065 waagent[1537]: 2024-07-02T07:54:21.345926Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 07:54:21.350662 waagent[1537]: 2024-07-02T07:54:21.349454Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 07:54:21.356463 waagent[1537]: 2024-07-02T07:54:21.352814Z INFO Daemon Daemon Python: 3.9.16 Jul 2 07:54:21.356882 waagent[1537]: 2024-07-02T07:54:21.356760Z INFO Daemon Daemon Run daemon Jul 2 07:54:21.359677 waagent[1537]: 2024-07-02T07:54:21.359605Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 07:54:21.377432 waagent[1537]: 2024-07-02T07:54:21.377284Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:54:21.387187 waagent[1537]: 2024-07-02T07:54:21.387046Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:54:21.392496 waagent[1537]: 2024-07-02T07:54:21.391896Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:54:21.397338 waagent[1537]: 2024-07-02T07:54:21.397245Z INFO Daemon Daemon Using waagent for provisioning Jul 2 07:54:21.400963 waagent[1537]: 2024-07-02T07:54:21.400896Z INFO Daemon Daemon Activate resource disk Jul 2 07:54:21.404275 waagent[1537]: 2024-07-02T07:54:21.404196Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 07:54:21.416129 waagent[1537]: 2024-07-02T07:54:21.416021Z INFO Daemon Daemon Found device: None Jul 2 07:54:21.419052 waagent[1537]: 2024-07-02T07:54:21.418957Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 07:54:21.444074 waagent[1537]: 2024-07-02T07:54:21.421604Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 07:54:21.444074 waagent[1537]: 2024-07-02T07:54:21.430503Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:54:21.444074 waagent[1537]: 2024-07-02T07:54:21.432304Z INFO Daemon Daemon Running default provisioning handler Jul 2 07:54:21.448888 waagent[1537]: 2024-07-02T07:54:21.448687Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:54:21.474933 waagent[1537]: 2024-07-02T07:54:21.456251Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:54:21.474933 waagent[1537]: 2024-07-02T07:54:21.459954Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:54:21.474933 waagent[1537]: 2024-07-02T07:54:21.464191Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 07:54:21.546580 waagent[1537]: 2024-07-02T07:54:21.546401Z INFO Daemon Daemon Successfully mounted dvd Jul 2 07:54:21.667266 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 07:54:21.689767 waagent[1537]: 2024-07-02T07:54:21.689603Z INFO Daemon Daemon Detect protocol endpoint Jul 2 07:54:21.697957 waagent[1537]: 2024-07-02T07:54:21.697810Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:54:21.701632 waagent[1537]: 2024-07-02T07:54:21.701530Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 07:54:21.705922 waagent[1537]: 2024-07-02T07:54:21.705658Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 07:54:21.709368 waagent[1537]: 2024-07-02T07:54:21.709284Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 07:54:21.713028 waagent[1537]: 2024-07-02T07:54:21.712936Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 07:54:21.829167 waagent[1537]: 2024-07-02T07:54:21.829075Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 07:54:21.833912 waagent[1537]: 2024-07-02T07:54:21.833854Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 07:54:21.837315 waagent[1537]: 2024-07-02T07:54:21.837231Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 07:54:22.398644 waagent[1537]: 2024-07-02T07:54:22.398242Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 07:54:22.413106 waagent[1537]: 2024-07-02T07:54:22.413017Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 07:54:22.417427 waagent[1537]: 2024-07-02T07:54:22.415581Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 07:54:22.536534 waagent[1537]: 2024-07-02T07:54:22.536386Z INFO Daemon Daemon Found private key matching thumbprint F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA Jul 2 07:54:22.541740 waagent[1537]: 2024-07-02T07:54:22.541625Z INFO Daemon Daemon Certificate with thumbprint FE9204E387CD9E69DA467DF210F8821ABCC54446 has no matching private key. Jul 2 07:54:22.548041 waagent[1537]: 2024-07-02T07:54:22.547887Z INFO Daemon Daemon Fetch goal state completed Jul 2 07:54:22.605765 waagent[1537]: 2024-07-02T07:54:22.605672Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 4323d862-dc69-4435-a822-9e46c7d3246c New eTag: 8741668220992286969] Jul 2 07:54:22.614567 waagent[1537]: 2024-07-02T07:54:22.607774Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:54:22.618611 waagent[1537]: 2024-07-02T07:54:22.618540Z INFO Daemon Daemon Starting provisioning Jul 2 07:54:22.627546 waagent[1537]: 2024-07-02T07:54:22.620138Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 07:54:22.627546 waagent[1537]: 2024-07-02T07:54:22.621113Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-195c2606d4] Jul 2 07:54:22.643405 waagent[1537]: 2024-07-02T07:54:22.643256Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-195c2606d4] Jul 2 07:54:22.647780 waagent[1537]: 2024-07-02T07:54:22.647628Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 07:54:22.652032 waagent[1537]: 2024-07-02T07:54:22.651890Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 07:54:22.669646 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 07:54:22.669937 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 07:54:22.670012 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 07:54:22.670443 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:54:22.678930 systemd-networkd[1196]: eth0: DHCPv6 lease lost Jul 2 07:54:22.680559 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:54:22.680775 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:54:22.684371 systemd[1]: Starting systemd-networkd.service... Jul 2 07:54:22.724188 systemd-networkd[1587]: enP22138s1: Link UP Jul 2 07:54:22.724201 systemd-networkd[1587]: enP22138s1: Gained carrier Jul 2 07:54:22.725644 systemd-networkd[1587]: eth0: Link UP Jul 2 07:54:22.725657 systemd-networkd[1587]: eth0: Gained carrier Jul 2 07:54:22.726131 systemd-networkd[1587]: lo: Link UP Jul 2 07:54:22.726141 systemd-networkd[1587]: lo: Gained carrier Jul 2 07:54:22.726464 systemd-networkd[1587]: eth0: Gained IPv6LL Jul 2 07:54:22.726870 systemd-networkd[1587]: Enumeration completed Jul 2 07:54:22.727024 systemd[1]: Started systemd-networkd.service. Jul 2 07:54:22.729785 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:54:22.732471 systemd-networkd[1587]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:54:22.742550 waagent[1537]: 2024-07-02T07:54:22.733683Z INFO Daemon Daemon Create user account if not exists Jul 2 07:54:22.742550 waagent[1537]: 2024-07-02T07:54:22.738045Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 07:54:22.745835 waagent[1537]: 2024-07-02T07:54:22.745705Z INFO Daemon Daemon Configure sudoer Jul 2 07:54:22.749379 waagent[1537]: 2024-07-02T07:54:22.749277Z INFO Daemon Daemon Configure sshd Jul 2 07:54:22.755751 waagent[1537]: 2024-07-02T07:54:22.755502Z INFO Daemon Daemon Deploy ssh public key. Jul 2 07:54:22.785944 systemd-networkd[1587]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:54:22.788899 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:54:23.424208 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:54:23.424470 systemd[1]: Stopped kubelet.service. Jul 2 07:54:23.424530 systemd[1]: kubelet.service: Consumed 1.169s CPU time. Jul 2 07:54:23.426316 systemd[1]: Starting kubelet.service... Jul 2 07:54:24.226846 waagent[1537]: 2024-07-02T07:54:24.226740Z INFO Daemon Daemon Provisioning complete Jul 2 07:54:24.251616 waagent[1537]: 2024-07-02T07:54:24.251516Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 07:54:24.256148 waagent[1537]: 2024-07-02T07:54:24.256040Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 07:54:24.271339 waagent[1537]: 2024-07-02T07:54:24.271189Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 07:54:24.428030 systemd[1]: Started kubelet.service. Jul 2 07:54:24.637557 waagent[1598]: 2024-07-02T07:54:24.637363Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 07:54:24.638361 waagent[1598]: 2024-07-02T07:54:24.638283Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:24.638514 waagent[1598]: 2024-07-02T07:54:24.638455Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:24.653729 waagent[1598]: 2024-07-02T07:54:24.653609Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 07:54:24.653984 waagent[1598]: 2024-07-02T07:54:24.653913Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 07:54:24.695147 kubelet[1601]: E0702 07:54:24.695085 1601 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:24.698488 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:24.698661 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:24.932956 waagent[1598]: 2024-07-02T07:54:24.932766Z INFO ExtHandler ExtHandler Found private key matching thumbprint F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA Jul 2 07:54:24.933235 waagent[1598]: 2024-07-02T07:54:24.933171Z INFO ExtHandler ExtHandler Certificate with thumbprint FE9204E387CD9E69DA467DF210F8821ABCC54446 has no matching private key. Jul 2 07:54:24.933497 waagent[1598]: 2024-07-02T07:54:24.933445Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 07:54:24.948757 waagent[1598]: 2024-07-02T07:54:24.948684Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 264c5d2f-f1a5-4825-ab93-79620f07b5f8 New eTag: 8741668220992286969] Jul 2 07:54:24.949382 waagent[1598]: 2024-07-02T07:54:24.949317Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:54:25.624911 waagent[1598]: 2024-07-02T07:54:25.624713Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:54:25.674299 waagent[1598]: 2024-07-02T07:54:25.674181Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1598 Jul 2 07:54:25.678083 waagent[1598]: 2024-07-02T07:54:25.678003Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:54:25.679385 waagent[1598]: 2024-07-02T07:54:25.679316Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:54:25.758559 waagent[1598]: 2024-07-02T07:54:25.758489Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:54:25.759087 waagent[1598]: 2024-07-02T07:54:25.759013Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:54:25.768078 waagent[1598]: 2024-07-02T07:54:25.768013Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:54:25.768645 waagent[1598]: 2024-07-02T07:54:25.768581Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:54:25.769807 waagent[1598]: 2024-07-02T07:54:25.769726Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 07:54:25.771151 waagent[1598]: 2024-07-02T07:54:25.771090Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:54:25.771564 waagent[1598]: 2024-07-02T07:54:25.771506Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:25.772295 waagent[1598]: 2024-07-02T07:54:25.772242Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:25.772461 waagent[1598]: 2024-07-02T07:54:25.772410Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:25.773107 waagent[1598]: 2024-07-02T07:54:25.773053Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:54:25.773317 waagent[1598]: 2024-07-02T07:54:25.773260Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:54:25.773628 waagent[1598]: 2024-07-02T07:54:25.773577Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:25.773906 waagent[1598]: 2024-07-02T07:54:25.773848Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:54:25.773906 waagent[1598]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:54:25.773906 waagent[1598]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:54:25.773906 waagent[1598]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:54:25.773906 waagent[1598]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:25.773906 waagent[1598]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:25.773906 waagent[1598]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:25.774767 waagent[1598]: 2024-07-02T07:54:25.774708Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:54:25.775369 waagent[1598]: 2024-07-02T07:54:25.775311Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:54:25.775604 waagent[1598]: 2024-07-02T07:54:25.775546Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:54:25.779240 waagent[1598]: 2024-07-02T07:54:25.779056Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:54:25.779761 waagent[1598]: 2024-07-02T07:54:25.779692Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:54:25.782323 waagent[1598]: 2024-07-02T07:54:25.782262Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:54:25.782491 waagent[1598]: 2024-07-02T07:54:25.782440Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:54:25.783899 waagent[1598]: 2024-07-02T07:54:25.783839Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:54:25.793490 waagent[1598]: 2024-07-02T07:54:25.793418Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 07:54:25.795615 waagent[1598]: 2024-07-02T07:54:25.795557Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:54:25.797031 waagent[1598]: 2024-07-02T07:54:25.796976Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 07:54:25.840889 waagent[1598]: 2024-07-02T07:54:25.840770Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1587' Jul 2 07:54:25.843163 waagent[1598]: 2024-07-02T07:54:25.843098Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 07:54:25.945394 waagent[1598]: 2024-07-02T07:54:25.945261Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 07:54:25.945394 waagent[1598]: Executing ['ip', '-a', '-o', 'link']: Jul 2 07:54:25.945394 waagent[1598]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 07:54:25.945394 waagent[1598]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:da:40:03 brd ff:ff:ff:ff:ff:ff Jul 2 07:54:25.945394 waagent[1598]: 3: enP22138s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:da:40:03 brd ff:ff:ff:ff:ff:ff\ altname enP22138p0s2 Jul 2 07:54:25.945394 waagent[1598]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 07:54:25.945394 waagent[1598]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 07:54:25.945394 waagent[1598]: 2: eth0 inet 10.200.8.4/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 07:54:25.945394 waagent[1598]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 07:54:25.945394 waagent[1598]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 07:54:25.945394 waagent[1598]: 2: eth0 inet6 fe80::20d:3aff:feda:4003/64 scope link \ valid_lft forever preferred_lft forever Jul 2 07:54:26.133470 waagent[1598]: 2024-07-02T07:54:26.133384Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 07:54:26.278910 waagent[1537]: 2024-07-02T07:54:26.278649Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 07:54:26.283330 waagent[1537]: 2024-07-02T07:54:26.283222Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 07:54:27.422831 waagent[1644]: 2024-07-02T07:54:27.422708Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 07:54:27.423617 waagent[1644]: 2024-07-02T07:54:27.423546Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 07:54:27.423773 waagent[1644]: 2024-07-02T07:54:27.423716Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 07:54:27.423941 waagent[1644]: 2024-07-02T07:54:27.423891Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Jul 2 07:54:27.434032 waagent[1644]: 2024-07-02T07:54:27.433914Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:54:27.434457 waagent[1644]: 2024-07-02T07:54:27.434393Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:27.434628 waagent[1644]: 2024-07-02T07:54:27.434579Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:27.447731 waagent[1644]: 2024-07-02T07:54:27.447638Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 07:54:27.461253 waagent[1644]: 2024-07-02T07:54:27.461181Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 07:54:27.462292 waagent[1644]: 2024-07-02T07:54:27.462225Z INFO ExtHandler Jul 2 07:54:27.462449 waagent[1644]: 2024-07-02T07:54:27.462394Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 8dd57b83-d17e-4a72-8eda-2d7bd94fb2c9 eTag: 8741668220992286969 source: Fabric] Jul 2 07:54:27.463183 waagent[1644]: 2024-07-02T07:54:27.463123Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 07:54:27.464289 waagent[1644]: 2024-07-02T07:54:27.464228Z INFO ExtHandler Jul 2 07:54:27.464425 waagent[1644]: 2024-07-02T07:54:27.464371Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 07:54:27.476682 waagent[1644]: 2024-07-02T07:54:27.476616Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 07:54:27.477227 waagent[1644]: 2024-07-02T07:54:27.477177Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:54:27.500926 waagent[1644]: 2024-07-02T07:54:27.500850Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 07:54:27.571886 waagent[1644]: 2024-07-02T07:54:27.571722Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FE9204E387CD9E69DA467DF210F8821ABCC54446', 'hasPrivateKey': False} Jul 2 07:54:27.572968 waagent[1644]: 2024-07-02T07:54:27.572883Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA', 'hasPrivateKey': True} Jul 2 07:54:27.573990 waagent[1644]: 2024-07-02T07:54:27.573930Z INFO ExtHandler Fetch goal state completed Jul 2 07:54:27.601695 waagent[1644]: 2024-07-02T07:54:27.601559Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 07:54:27.614193 waagent[1644]: 2024-07-02T07:54:27.614077Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1644 Jul 2 07:54:27.617601 waagent[1644]: 2024-07-02T07:54:27.617520Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:54:27.619031 waagent[1644]: 2024-07-02T07:54:27.618965Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:54:27.624397 waagent[1644]: 2024-07-02T07:54:27.624336Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:54:27.624791 waagent[1644]: 2024-07-02T07:54:27.624734Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:54:27.633350 waagent[1644]: 2024-07-02T07:54:27.633285Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:54:27.633889 waagent[1644]: 2024-07-02T07:54:27.633829Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:54:27.640741 waagent[1644]: 2024-07-02T07:54:27.640631Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 07:54:27.641791 waagent[1644]: 2024-07-02T07:54:27.641721Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 07:54:27.643391 waagent[1644]: 2024-07-02T07:54:27.643327Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:54:27.643635 waagent[1644]: 2024-07-02T07:54:27.643577Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:27.644158 waagent[1644]: 2024-07-02T07:54:27.644102Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:27.644735 waagent[1644]: 2024-07-02T07:54:27.644673Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:54:27.645088 waagent[1644]: 2024-07-02T07:54:27.645029Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:54:27.645088 waagent[1644]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:54:27.645088 waagent[1644]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:54:27.645088 waagent[1644]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:54:27.645088 waagent[1644]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:27.645088 waagent[1644]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:27.645088 waagent[1644]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:27.648033 waagent[1644]: 2024-07-02T07:54:27.647948Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:27.648258 waagent[1644]: 2024-07-02T07:54:27.648194Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:54:27.649357 waagent[1644]: 2024-07-02T07:54:27.649298Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:54:27.649631 waagent[1644]: 2024-07-02T07:54:27.649577Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:27.649773 waagent[1644]: 2024-07-02T07:54:27.649719Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:54:27.650722 waagent[1644]: 2024-07-02T07:54:27.650661Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:54:27.651260 waagent[1644]: 2024-07-02T07:54:27.651202Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:54:27.653093 waagent[1644]: 2024-07-02T07:54:27.652954Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:54:27.654004 waagent[1644]: 2024-07-02T07:54:27.653934Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:54:27.654281 waagent[1644]: 2024-07-02T07:54:27.654218Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:54:27.654539 waagent[1644]: 2024-07-02T07:54:27.654474Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:54:27.676743 waagent[1644]: 2024-07-02T07:54:27.676674Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 07:54:27.684458 waagent[1644]: 2024-07-02T07:54:27.684387Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 07:54:27.684458 waagent[1644]: Executing ['ip', '-a', '-o', 'link']: Jul 2 07:54:27.684458 waagent[1644]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 07:54:27.684458 waagent[1644]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:da:40:03 brd ff:ff:ff:ff:ff:ff Jul 2 07:54:27.684458 waagent[1644]: 3: enP22138s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:da:40:03 brd ff:ff:ff:ff:ff:ff\ altname enP22138p0s2 Jul 2 07:54:27.684458 waagent[1644]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 07:54:27.684458 waagent[1644]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 07:54:27.684458 waagent[1644]: 2: eth0 inet 10.200.8.4/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 07:54:27.684458 waagent[1644]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 07:54:27.684458 waagent[1644]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 07:54:27.684458 waagent[1644]: 2: eth0 inet6 fe80::20d:3aff:feda:4003/64 scope link \ valid_lft forever preferred_lft forever Jul 2 07:54:27.723001 waagent[1644]: 2024-07-02T07:54:27.722898Z INFO ExtHandler ExtHandler Jul 2 07:54:27.723216 waagent[1644]: 2024-07-02T07:54:27.723156Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: b880232e-8cd8-46a4-b218-32fe26a0e092 correlation adf226e5-8249-461e-ae4a-92246e46d181 created: 2024-07-02T07:52:39.233597Z] Jul 2 07:54:27.724189 waagent[1644]: 2024-07-02T07:54:27.724121Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 07:54:27.729959 waagent[1644]: 2024-07-02T07:54:27.729789Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 6 ms] Jul 2 07:54:27.767266 waagent[1644]: 2024-07-02T07:54:27.767118Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 07:54:27.788359 waagent[1644]: 2024-07-02T07:54:27.788269Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 6AF5DBA3-687C-45C6-812C-0696C59E44BA;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 07:54:27.814476 waagent[1644]: 2024-07-02T07:54:27.814358Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 07:54:27.814476 waagent[1644]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:27.814476 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.814476 waagent[1644]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:27.814476 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.814476 waagent[1644]: Chain OUTPUT (policy ACCEPT 4 packets, 401 bytes) Jul 2 07:54:27.814476 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.814476 waagent[1644]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:54:27.814476 waagent[1644]: 4 587 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:54:27.814476 waagent[1644]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:54:27.821890 waagent[1644]: 2024-07-02T07:54:27.821763Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 07:54:27.821890 waagent[1644]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:27.821890 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.821890 waagent[1644]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:27.821890 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.821890 waagent[1644]: Chain OUTPUT (policy ACCEPT 4 packets, 401 bytes) Jul 2 07:54:27.821890 waagent[1644]: pkts bytes target prot opt in out source destination Jul 2 07:54:27.821890 waagent[1644]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:54:27.821890 waagent[1644]: 4 587 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:54:27.821890 waagent[1644]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:54:27.822466 waagent[1644]: 2024-07-02T07:54:27.822412Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 07:54:34.924383 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:54:34.924730 systemd[1]: Stopped kubelet.service. Jul 2 07:54:34.926929 systemd[1]: Starting kubelet.service... Jul 2 07:54:35.012491 systemd[1]: Started kubelet.service. Jul 2 07:54:35.517119 kubelet[1696]: E0702 07:54:35.517049 1696 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:35.519194 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:35.519358 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:45.675615 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 07:54:45.675991 systemd[1]: Stopped kubelet.service. Jul 2 07:54:45.678290 systemd[1]: Starting kubelet.service... Jul 2 07:54:45.772583 systemd[1]: Started kubelet.service. Jul 2 07:54:46.306506 kubelet[1707]: E0702 07:54:46.306446 1707 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:46.308451 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:46.308575 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:48.916633 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Jul 2 07:54:56.424296 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 07:54:56.424655 systemd[1]: Stopped kubelet.service. Jul 2 07:54:56.426924 systemd[1]: Starting kubelet.service... Jul 2 07:54:56.515194 systemd[1]: Started kubelet.service. Jul 2 07:54:57.785643 kubelet[1717]: E0702 07:54:57.038017 1717 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:57.039574 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:57.039694 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:57.944131 update_engine[1426]: I0702 07:54:57.944044 1426 update_attempter.cc:509] Updating boot flags... Jul 2 07:55:07.174176 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 07:55:07.174458 systemd[1]: Stopped kubelet.service. Jul 2 07:55:07.176439 systemd[1]: Starting kubelet.service... Jul 2 07:55:07.266164 systemd[1]: Started kubelet.service. Jul 2 07:55:07.769810 kubelet[1794]: E0702 07:55:07.769712 1794 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:07.771768 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:07.771956 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:16.211943 systemd[1]: Created slice system-sshd.slice. Jul 2 07:55:16.214208 systemd[1]: Started sshd@0-10.200.8.4:22-10.200.16.10:44114.service. Jul 2 07:55:17.051616 sshd[1802]: Accepted publickey for core from 10.200.16.10 port 44114 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:17.053582 sshd[1802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:17.059362 systemd-logind[1424]: New session 3 of user core. Jul 2 07:55:17.060094 systemd[1]: Started session-3.scope. Jul 2 07:55:17.614854 systemd[1]: Started sshd@1-10.200.8.4:22-10.200.16.10:44118.service. Jul 2 07:55:17.924470 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 07:55:17.924933 systemd[1]: Stopped kubelet.service. Jul 2 07:55:17.927215 systemd[1]: Starting kubelet.service... Jul 2 07:55:18.089593 systemd[1]: Started kubelet.service. Jul 2 07:55:18.144919 kubelet[1813]: E0702 07:55:18.144856 1813 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:18.146990 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:18.147327 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:18.259375 sshd[1807]: Accepted publickey for core from 10.200.16.10 port 44118 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:18.260635 sshd[1807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:18.265894 systemd[1]: Started session-4.scope. Jul 2 07:55:18.266699 systemd-logind[1424]: New session 4 of user core. Jul 2 07:55:18.718199 sshd[1807]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:18.721367 systemd[1]: sshd@1-10.200.8.4:22-10.200.16.10:44118.service: Deactivated successfully. Jul 2 07:55:18.722315 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:55:18.722986 systemd-logind[1424]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:55:18.723937 systemd-logind[1424]: Removed session 4. Jul 2 07:55:18.828049 systemd[1]: Started sshd@2-10.200.8.4:22-10.200.16.10:39786.service. Jul 2 07:55:19.476199 sshd[1825]: Accepted publickey for core from 10.200.16.10 port 39786 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:19.477863 sshd[1825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:19.483454 systemd[1]: Started session-5.scope. Jul 2 07:55:19.484114 systemd-logind[1424]: New session 5 of user core. Jul 2 07:55:19.933707 sshd[1825]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:19.936877 systemd[1]: sshd@2-10.200.8.4:22-10.200.16.10:39786.service: Deactivated successfully. Jul 2 07:55:19.937682 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:55:19.938429 systemd-logind[1424]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:55:19.939333 systemd-logind[1424]: Removed session 5. Jul 2 07:55:20.057851 systemd[1]: Started sshd@3-10.200.8.4:22-10.200.16.10:39792.service. Jul 2 07:55:20.696722 sshd[1831]: Accepted publickey for core from 10.200.16.10 port 39792 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:20.698569 sshd[1831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:20.704372 systemd[1]: Started session-6.scope. Jul 2 07:55:20.705022 systemd-logind[1424]: New session 6 of user core. Jul 2 07:55:21.161239 sshd[1831]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:21.164577 systemd[1]: sshd@3-10.200.8.4:22-10.200.16.10:39792.service: Deactivated successfully. Jul 2 07:55:21.165513 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:55:21.166174 systemd-logind[1424]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:55:21.167009 systemd-logind[1424]: Removed session 6. Jul 2 07:55:21.277639 systemd[1]: Started sshd@4-10.200.8.4:22-10.200.16.10:39802.service. Jul 2 07:55:21.928401 sshd[1837]: Accepted publickey for core from 10.200.16.10 port 39802 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:21.929970 sshd[1837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:21.937893 systemd-logind[1424]: New session 7 of user core. Jul 2 07:55:21.937984 systemd[1]: Started session-7.scope. Jul 2 07:55:22.705488 sudo[1840]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:55:22.705899 sudo[1840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:22.730059 dbus-daemon[1413]: \xd0m\xec5\xbcU: received setenforce notice (enforcing=-912209328) Jul 2 07:55:22.732173 sudo[1840]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:22.856365 sshd[1837]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:22.860404 systemd[1]: sshd@4-10.200.8.4:22-10.200.16.10:39802.service: Deactivated successfully. Jul 2 07:55:22.861591 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:55:22.862414 systemd-logind[1424]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:55:22.863443 systemd-logind[1424]: Removed session 7. Jul 2 07:55:22.963698 systemd[1]: Started sshd@5-10.200.8.4:22-10.200.16.10:39816.service. Jul 2 07:55:23.603276 sshd[1844]: Accepted publickey for core from 10.200.16.10 port 39816 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:23.604905 sshd[1844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:23.609872 systemd-logind[1424]: New session 8 of user core. Jul 2 07:55:23.609957 systemd[1]: Started session-8.scope. Jul 2 07:55:23.958208 sudo[1848]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:55:23.958578 sudo[1848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:23.961601 sudo[1848]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:23.967823 sudo[1847]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:55:23.968126 sudo[1847]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:23.979764 systemd[1]: Stopping audit-rules.service... Jul 2 07:55:23.982000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:55:23.984635 auditctl[1851]: No rules Jul 2 07:55:23.985082 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:55:23.985340 systemd[1]: Stopped audit-rules.service. Jul 2 07:55:24.003768 kernel: kauditd_printk_skb: 52 callbacks suppressed Jul 2 07:55:24.003950 kernel: audit: type=1305 audit(1719906923.982:220): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:55:23.994326 systemd[1]: Starting audit-rules.service... Jul 2 07:55:23.982000 audit[1851]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7e96de00 a2=420 a3=0 items=0 ppid=1 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.982000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:55:24.042898 augenrules[1868]: No rules Jul 2 07:55:24.046938 systemd[1]: Finished audit-rules.service. Jul 2 07:55:24.048215 sudo[1847]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:24.055217 kernel: audit: type=1300 audit(1719906923.982:220): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7e96de00 a2=420 a3=0 items=0 ppid=1 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.056261 kernel: audit: type=1327 audit(1719906923.982:220): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:55:24.056296 kernel: audit: type=1131 audit(1719906923.982:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.087217 kernel: audit: type=1130 audit(1719906924.043:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.087386 kernel: audit: type=1106 audit(1719906924.043:223): pid=1847 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.043000 audit[1847]: USER_END pid=1847 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.043000 audit[1847]: CRED_DISP pid=1847 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.115819 kernel: audit: type=1104 audit(1719906924.043:224): pid=1847 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.151475 sshd[1844]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:24.152000 audit[1844]: USER_END pid=1844 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.157643 systemd[1]: sshd@5-10.200.8.4:22-10.200.16.10:39816.service: Deactivated successfully. Jul 2 07:55:24.158366 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:55:24.159837 systemd-logind[1424]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:55:24.160582 systemd-logind[1424]: Removed session 8. Jul 2 07:55:24.152000 audit[1844]: CRED_DISP pid=1844 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.178854 kernel: audit: type=1106 audit(1719906924.152:225): pid=1844 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.178933 kernel: audit: type=1104 audit(1719906924.152:226): pid=1844 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.4:22-10.200.16.10:39816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.218037 kernel: audit: type=1131 audit(1719906924.157:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.4:22-10.200.16.10:39816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.260366 systemd[1]: Started sshd@6-10.200.8.4:22-10.200.16.10:39818.service. Jul 2 07:55:24.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.903000 audit[1874]: USER_ACCT pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.904629 sshd[1874]: Accepted publickey for core from 10.200.16.10 port 39818 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:55:24.904000 audit[1874]: CRED_ACQ pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.905000 audit[1874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebd29aac0 a2=3 a3=0 items=0 ppid=1 pid=1874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:24.906275 sshd[1874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:24.912492 systemd[1]: Started session-9.scope. Jul 2 07:55:24.913367 systemd-logind[1424]: New session 9 of user core. Jul 2 07:55:24.922000 audit[1874]: USER_START pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:24.926000 audit[1876]: CRED_ACQ pid=1876 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:25.276000 audit[1877]: USER_ACCT pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:25.277806 sudo[1877]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:55:25.277000 audit[1877]: CRED_REFR pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:25.278159 sudo[1877]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:25.279000 audit[1877]: USER_START pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:25.305652 systemd[1]: Starting docker.service... Jul 2 07:55:25.381789 env[1887]: time="2024-07-02T07:55:25.381723785Z" level=info msg="Starting up" Jul 2 07:55:25.383350 env[1887]: time="2024-07-02T07:55:25.383316538Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:55:25.383561 env[1887]: time="2024-07-02T07:55:25.383545345Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:55:25.383630 env[1887]: time="2024-07-02T07:55:25.383617747Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:55:25.383670 env[1887]: time="2024-07-02T07:55:25.383662849Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:55:25.392241 env[1887]: time="2024-07-02T07:55:25.392181828Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:55:25.392241 env[1887]: time="2024-07-02T07:55:25.392216329Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:55:25.392241 env[1887]: time="2024-07-02T07:55:25.392245030Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:55:25.392559 env[1887]: time="2024-07-02T07:55:25.392261430Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:55:25.400599 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4209407675-merged.mount: Deactivated successfully. Jul 2 07:55:25.606556 env[1887]: time="2024-07-02T07:55:25.605496209Z" level=info msg="Loading containers: start." Jul 2 07:55:25.667000 audit[1915]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.667000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff1d9a54a0 a2=0 a3=7fff1d9a548c items=0 ppid=1887 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:55:25.672000 audit[1917]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.672000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffec25a53b0 a2=0 a3=7ffec25a539c items=0 ppid=1887 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:55:25.674000 audit[1919]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.674000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9b9bad90 a2=0 a3=7ffc9b9bad7c items=0 ppid=1887 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:55:25.677000 audit[1921]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.677000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd8c0b8bf0 a2=0 a3=7ffd8c0b8bdc items=0 ppid=1887 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:55:25.680000 audit[1923]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.680000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc8f09bc0 a2=0 a3=7ffdc8f09bac items=0 ppid=1887 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:55:25.682000 audit[1925]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.682000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4ced46c0 a2=0 a3=7fff4ced46ac items=0 ppid=1887 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:55:25.700000 audit[1927]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.700000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3abb7740 a2=0 a3=7ffc3abb772c items=0 ppid=1887 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:55:25.703000 audit[1929]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.703000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc0886f160 a2=0 a3=7ffc0886f14c items=0 ppid=1887 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:55:25.705000 audit[1931]: NETFILTER_CFG table=filter:16 family=2 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.705000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffd965fd50 a2=0 a3=7fffd965fd3c items=0 ppid=1887 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.705000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:55:25.727000 audit[1935]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_unregister_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.727000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff157a8d00 a2=0 a3=7fff157a8cec items=0 ppid=1887 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:55:25.728000 audit[1936]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.728000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7872dbb0 a2=0 a3=7fff7872db9c items=0 ppid=1887 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:55:25.779904 kernel: Initializing XFRM netlink socket Jul 2 07:55:25.804900 env[1887]: time="2024-07-02T07:55:25.804856034Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:55:25.893000 audit[1944]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.893000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd26de1df0 a2=0 a3=7ffd26de1ddc items=0 ppid=1887 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:55:25.920000 audit[1947]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.920000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff51214e40 a2=0 a3=7fff51214e2c items=0 ppid=1887 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:55:25.924000 audit[1950]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.924000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd1e743010 a2=0 a3=7ffd1e742ffc items=0 ppid=1887 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:55:25.926000 audit[1952]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.926000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd822bb100 a2=0 a3=7ffd822bb0ec items=0 ppid=1887 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:55:25.928000 audit[1954]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.928000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffda533d430 a2=0 a3=7ffda533d41c items=0 ppid=1887 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:55:25.930000 audit[1956]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.930000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe35a8ffd0 a2=0 a3=7ffe35a8ffbc items=0 ppid=1887 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:55:25.932000 audit[1958]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.932000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd7e271820 a2=0 a3=7ffd7e27180c items=0 ppid=1887 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:55:25.935000 audit[1960]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.935000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffddd825520 a2=0 a3=7ffddd82550c items=0 ppid=1887 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:55:25.937000 audit[1962]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.937000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc10663e30 a2=0 a3=7ffc10663e1c items=0 ppid=1887 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:55:25.939000 audit[1964]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.939000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff798c27d0 a2=0 a3=7fff798c27bc items=0 ppid=1887 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:55:25.941000 audit[1966]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.941000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc73cb7cd0 a2=0 a3=7ffc73cb7cbc items=0 ppid=1887 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:55:25.942536 systemd-networkd[1587]: docker0: Link UP Jul 2 07:55:25.959000 audit[1970]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_unregister_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.959000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce60d2880 a2=0 a3=7ffce60d286c items=0 ppid=1887 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:55:25.960000 audit[1971]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:25.960000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd7e8ce8d0 a2=0 a3=7ffd7e8ce8bc items=0 ppid=1887 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:55:25.961729 env[1887]: time="2024-07-02T07:55:25.961685367Z" level=info msg="Loading containers: done." Jul 2 07:55:25.996374 env[1887]: time="2024-07-02T07:55:25.996311500Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:55:25.996631 env[1887]: time="2024-07-02T07:55:25.996578709Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:55:25.996757 env[1887]: time="2024-07-02T07:55:25.996733614Z" level=info msg="Daemon has completed initialization" Jul 2 07:55:26.032538 systemd[1]: Started docker.service. Jul 2 07:55:26.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:26.048322 env[1887]: time="2024-07-02T07:55:26.047182326Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:55:28.174151 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Jul 2 07:55:28.174427 systemd[1]: Stopped kubelet.service. Jul 2 07:55:28.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.177341 systemd[1]: Starting kubelet.service... Jul 2 07:55:28.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.371753 systemd[1]: Started kubelet.service. Jul 2 07:55:28.848409 kubelet[2009]: E0702 07:55:28.848341 2009 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:28.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:28.850336 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:28.850453 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:33.361210 env[1438]: time="2024-07-02T07:55:33.361152920Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\"" Jul 2 07:55:34.206208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4290693476.mount: Deactivated successfully. Jul 2 07:55:36.879305 env[1438]: time="2024-07-02T07:55:36.879236965Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:36.886446 env[1438]: time="2024-07-02T07:55:36.886388342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2de212bf8c1b7b0d1b2703356ac7ddcfccaadfcdcd32c1ae914b6078d11e524,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:36.893834 env[1438]: time="2024-07-02T07:55:36.893770125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:36.899251 env[1438]: time="2024-07-02T07:55:36.899196659Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:aec9d1701c304eee8607d728a39baaa511d65bef6dd9861010618f63fbadeb10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:36.899952 env[1438]: time="2024-07-02T07:55:36.899909677Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\" returns image reference \"sha256:b2de212bf8c1b7b0d1b2703356ac7ddcfccaadfcdcd32c1ae914b6078d11e524\"" Jul 2 07:55:36.911145 env[1438]: time="2024-07-02T07:55:36.911092354Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\"" Jul 2 07:55:38.924358 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. Jul 2 07:55:38.946203 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 07:55:38.946282 kernel: audit: type=1130 audit(1719906938.923:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.924661 systemd[1]: Stopped kubelet.service. Jul 2 07:55:38.926290 systemd[1]: Starting kubelet.service... Jul 2 07:55:38.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.967829 kernel: audit: type=1131 audit(1719906938.923:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:39.037018 systemd[1]: Started kubelet.service. Jul 2 07:55:39.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:39.051869 kernel: audit: type=1130 audit(1719906939.036:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:39.540441 kubelet[2033]: E0702 07:55:39.540370 2033 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:39.542657 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:39.542832 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:39.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:39.562859 kernel: audit: type=1131 audit(1719906939.542:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:40.618035 env[1438]: time="2024-07-02T07:55:40.617971065Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.625029 env[1438]: time="2024-07-02T07:55:40.624968422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:20145ae80ad309fd0c963e2539f6ef0be795ace696539514894b290892c1884b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.629604 env[1438]: time="2024-07-02T07:55:40.629548025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.635331 env[1438]: time="2024-07-02T07:55:40.635281154Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6014c3572ec683841bbb16f87b94da28ee0254b95e2dba2d1850d62bd0111f09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:40.636050 env[1438]: time="2024-07-02T07:55:40.636012570Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\" returns image reference \"sha256:20145ae80ad309fd0c963e2539f6ef0be795ace696539514894b290892c1884b\"" Jul 2 07:55:40.648925 env[1438]: time="2024-07-02T07:55:40.648883159Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\"" Jul 2 07:55:42.138839 env[1438]: time="2024-07-02T07:55:42.138763656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:42.143992 env[1438]: time="2024-07-02T07:55:42.143941067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:12c62a5a0745d200eb8333ea6244f6d6328e64c5c3b645a4ade456cc645399b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:42.148969 env[1438]: time="2024-07-02T07:55:42.148926774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:42.153522 env[1438]: time="2024-07-02T07:55:42.153462471Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:46cf7475c8daffb743c856a1aea0ddea35e5acd2418be18b1e22cf98d9c9b445,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:42.154500 env[1438]: time="2024-07-02T07:55:42.154454392Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\" returns image reference \"sha256:12c62a5a0745d200eb8333ea6244f6d6328e64c5c3b645a4ade456cc645399b9\"" Jul 2 07:55:42.166412 env[1438]: time="2024-07-02T07:55:42.166372148Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 07:55:43.763320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1056957942.mount: Deactivated successfully. Jul 2 07:55:44.435678 env[1438]: time="2024-07-02T07:55:44.435612857Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:44.443146 env[1438]: time="2024-07-02T07:55:44.443085710Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:44.449317 env[1438]: time="2024-07-02T07:55:44.449247136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:44.453551 env[1438]: time="2024-07-02T07:55:44.453497823Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:44.454925 env[1438]: time="2024-07-02T07:55:44.454841751Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\"" Jul 2 07:55:44.468649 env[1438]: time="2024-07-02T07:55:44.468597432Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:55:45.033834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1030234948.mount: Deactivated successfully. Jul 2 07:55:45.067723 env[1438]: time="2024-07-02T07:55:45.067662756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:45.077422 env[1438]: time="2024-07-02T07:55:45.077361850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:45.082664 env[1438]: time="2024-07-02T07:55:45.082612855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:45.087849 env[1438]: time="2024-07-02T07:55:45.087789558Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:45.088250 env[1438]: time="2024-07-02T07:55:45.088216567Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:55:45.099273 env[1438]: time="2024-07-02T07:55:45.099227487Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 07:55:45.697708 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4153854933.mount: Deactivated successfully. Jul 2 07:55:49.446673 env[1438]: time="2024-07-02T07:55:49.446599296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.461915 env[1438]: time="2024-07-02T07:55:49.461812574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.470421 env[1438]: time="2024-07-02T07:55:49.470285929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.476030 env[1438]: time="2024-07-02T07:55:49.475969333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.476766 env[1438]: time="2024-07-02T07:55:49.476726947Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Jul 2 07:55:49.488465 env[1438]: time="2024-07-02T07:55:49.488424160Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Jul 2 07:55:49.674125 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 9. Jul 2 07:55:49.674402 systemd[1]: Stopped kubelet.service. Jul 2 07:55:49.690211 kernel: audit: type=1130 audit(1719906949.673:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.676342 systemd[1]: Starting kubelet.service... Jul 2 07:55:49.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.706825 kernel: audit: type=1131 audit(1719906949.673:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:50.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:50.576653 systemd[1]: Started kubelet.service. Jul 2 07:55:50.607830 kernel: audit: type=1130 audit(1719906950.576:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:50.647382 kubelet[2071]: E0702 07:55:50.647316 2071 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:50.649368 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:50.649540 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:50.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:50.665952 kernel: audit: type=1131 audit(1719906950.649:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:51.586161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1534986316.mount: Deactivated successfully. Jul 2 07:55:52.548853 env[1438]: time="2024-07-02T07:55:52.548769000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.559245 env[1438]: time="2024-07-02T07:55:52.559182178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.563916 env[1438]: time="2024-07-02T07:55:52.563866758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.568561 env[1438]: time="2024-07-02T07:55:52.568516938Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.569010 env[1438]: time="2024-07-02T07:55:52.568971546Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Jul 2 07:55:55.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.241132 systemd[1]: Stopped kubelet.service. Jul 2 07:55:55.248375 systemd[1]: Starting kubelet.service... Jul 2 07:55:55.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.270495 kernel: audit: type=1130 audit(1719906955.240:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.270630 kernel: audit: type=1131 audit(1719906955.245:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.280430 systemd[1]: Reloading. Jul 2 07:55:55.377467 /usr/lib/systemd/system-generators/torcx-generator[2174]: time="2024-07-02T07:55:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:55:55.378056 /usr/lib/systemd/system-generators/torcx-generator[2174]: time="2024-07-02T07:55:55Z" level=info msg="torcx already run" Jul 2 07:55:55.507390 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:55.507412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:55.524376 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:55.611891 kernel: audit: type=1400 audit(1719906955.596:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.638502 kernel: audit: type=1400 audit(1719906955.596:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.638672 kernel: audit: type=1400 audit(1719906955.596:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.671632 kernel: audit: type=1400 audit(1719906955.596:279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.671776 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:55:55.671815 kernel: audit: type=1400 audit(1719906955.596:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.671840 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692699 kernel: audit: type=1400 audit(1719906955.596:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit: BPF prog-id=44 op=LOAD Jul 2 07:55:55.610000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit: BPF prog-id=45 op=LOAD Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.610000 audit: BPF prog-id=46 op=LOAD Jul 2 07:55:55.611000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:55:55.611000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit: BPF prog-id=47 op=LOAD Jul 2 07:55:55.624000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit: BPF prog-id=48 op=LOAD Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.637000 audit: BPF prog-id=49 op=LOAD Jul 2 07:55:55.637000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:55:55.637000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:55:55.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit: BPF prog-id=50 op=LOAD Jul 2 07:55:55.692000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.694000 audit: BPF prog-id=55 op=LOAD Jul 2 07:55:55.694000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.695000 audit: BPF prog-id=56 op=LOAD Jul 2 07:55:55.695000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.696000 audit: BPF prog-id=57 op=LOAD Jul 2 07:55:55.696000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:55.698000 audit: BPF prog-id=58 op=LOAD Jul 2 07:55:55.698000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:55:55.719120 systemd[1]: Started kubelet.service. Jul 2 07:55:55.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.725824 systemd[1]: Stopping kubelet.service... Jul 2 07:55:55.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:55.726474 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:55:55.726707 systemd[1]: Stopped kubelet.service. Jul 2 07:55:55.728921 systemd[1]: Starting kubelet.service... Jul 2 07:55:56.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:56.918381 systemd[1]: Started kubelet.service. Jul 2 07:55:56.979152 kubelet[2237]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:56.979152 kubelet[2237]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:55:56.979152 kubelet[2237]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:56.979728 kubelet[2237]: I0702 07:55:56.979227 2237 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:55:57.276664 kubelet[2237]: I0702 07:55:57.276263 2237 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:55:57.276664 kubelet[2237]: I0702 07:55:57.276296 2237 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:55:57.276990 kubelet[2237]: I0702 07:55:57.276843 2237 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:55:57.293834 kubelet[2237]: E0702 07:55:57.293775 2237 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.294071 kubelet[2237]: I0702 07:55:57.293883 2237 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:55:57.322276 kubelet[2237]: I0702 07:55:57.321523 2237 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:55:57.326265 kubelet[2237]: I0702 07:55:57.326237 2237 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:55:57.326613 kubelet[2237]: I0702 07:55:57.326599 2237 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:55:57.327287 kubelet[2237]: I0702 07:55:57.327269 2237 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:55:57.327389 kubelet[2237]: I0702 07:55:57.327382 2237 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:55:57.328179 kubelet[2237]: I0702 07:55:57.328160 2237 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:57.330977 kubelet[2237]: I0702 07:55:57.330952 2237 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:55:57.331085 kubelet[2237]: I0702 07:55:57.330986 2237 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:55:57.331085 kubelet[2237]: I0702 07:55:57.331027 2237 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:55:57.331085 kubelet[2237]: I0702 07:55:57.331044 2237 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:55:57.336956 kubelet[2237]: W0702 07:55:57.336550 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-195c2606d4&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.336956 kubelet[2237]: E0702 07:55:57.336617 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-195c2606d4&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.336956 kubelet[2237]: W0702 07:55:57.336693 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.336956 kubelet[2237]: E0702 07:55:57.336727 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.337208 kubelet[2237]: I0702 07:55:57.337079 2237 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:55:57.340262 kubelet[2237]: W0702 07:55:57.340231 2237 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:55:57.341185 kubelet[2237]: I0702 07:55:57.341157 2237 server.go:1232] "Started kubelet" Jul 2 07:55:57.352000 audit[2237]: AVC avc: denied { mac_admin } for pid=2237 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:57.352000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:57.352000 audit[2237]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b0fb30 a1=c000c6b128 a2=c000b0fb00 a3=25 items=0 ppid=1 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:57.356229 kubelet[2237]: I0702 07:55:57.356198 2237 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:55:57.355000 audit[2237]: AVC avc: denied { mac_admin } for pid=2237 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:57.355000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:57.355000 audit[2237]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae9520 a1=c000c6b140 a2=c000b0fbc0 a3=25 items=0 ppid=1 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:57.356726 kubelet[2237]: I0702 07:55:57.356713 2237 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:55:57.356935 kubelet[2237]: I0702 07:55:57.356921 2237 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:55:57.359305 kubelet[2237]: E0702 07:55:57.359272 2237 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:55:57.359400 kubelet[2237]: E0702 07:55:57.359316 2237 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:55:57.360000 audit[2247]: NETFILTER_CFG table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:57.360000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc3386d9f0 a2=0 a3=7ffc3386d9dc items=0 ppid=2237 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:57.361000 audit[2248]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:57.361000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd61af3d20 a2=0 a3=7ffd61af3d0c items=0 ppid=2237 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:57.363296 kubelet[2237]: I0702 07:55:57.363275 2237 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:55:57.364106 kubelet[2237]: I0702 07:55:57.364084 2237 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:55:57.364611 kubelet[2237]: I0702 07:55:57.364593 2237 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:55:57.365000 audit[2250]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:57.365000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde0431bd0 a2=0 a3=7ffde0431bbc items=0 ppid=2237 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:57.366528 kubelet[2237]: I0702 07:55:57.366509 2237 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:55:57.367025 kubelet[2237]: I0702 07:55:57.367007 2237 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:55:57.367748 kubelet[2237]: E0702 07:55:57.356199 2237 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.5-a-195c2606d4.17de5643e70a8ba6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.5-a-195c2606d4", UID:"ci-3510.3.5-a-195c2606d4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.5-a-195c2606d4"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 57, 341133734, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 57, 341133734, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.5-a-195c2606d4"}': 'Post "https://10.200.8.4:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.4:6443: connect: connection refused'(may retry after sleeping) Jul 2 07:55:57.367944 kubelet[2237]: I0702 07:55:57.367850 2237 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:55:57.368302 kubelet[2237]: I0702 07:55:57.367917 2237 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:55:57.368913 kubelet[2237]: E0702 07:55:57.368895 2237 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="200ms" Jul 2 07:55:57.368000 audit[2252]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:57.368000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff412093e0 a2=0 a3=7fff412093cc items=0 ppid=2237 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:57.371917 kubelet[2237]: W0702 07:55:57.371866 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.372014 kubelet[2237]: E0702 07:55:57.371924 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:57.431217 kubelet[2237]: I0702 07:55:57.431183 2237 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:55:57.431217 kubelet[2237]: I0702 07:55:57.431222 2237 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:55:57.431470 kubelet[2237]: I0702 07:55:57.431245 2237 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:57.466484 kubelet[2237]: I0702 07:55:57.466450 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:57.466927 kubelet[2237]: E0702 07:55:57.466905 2237 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.557550 kubelet[2237]: E0702 07:55:57.569858 2237 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="400ms" Jul 2 07:55:58.557550 kubelet[2237]: I0702 07:55:57.669930 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.557550 kubelet[2237]: E0702 07:55:57.670318 2237 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.557550 kubelet[2237]: E0702 07:55:57.971333 2237 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="800ms" Jul 2 07:55:58.557550 kubelet[2237]: I0702 07:55:58.072542 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.557550 kubelet[2237]: E0702 07:55:58.072909 2237 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.604898 kubelet[2237]: I0702 07:55:58.604842 2237 policy_none.go:49] "None policy: Start" Jul 2 07:55:58.605951 kubelet[2237]: I0702 07:55:58.605922 2237 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:55:58.606085 kubelet[2237]: I0702 07:55:58.605959 2237 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:55:58.628332 systemd[1]: Created slice kubepods.slice. Jul 2 07:55:58.637696 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:55:58.648217 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:55:58.646000 audit[2260]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:58.646000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcfcb56f30 a2=0 a3=7ffcfcb56f1c items=0 ppid=2237 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:55:58.648910 kubelet[2237]: I0702 07:55:58.648891 2237 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:55:58.649000 audit[2261]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:58.649000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcedbd44b0 a2=0 a3=7ffcedbd449c items=0 ppid=2237 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:58.651833 kubelet[2237]: I0702 07:55:58.651780 2237 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:55:58.651980 kubelet[2237]: I0702 07:55:58.651966 2237 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:55:58.652230 kubelet[2237]: I0702 07:55:58.652217 2237 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:55:58.652370 kubelet[2237]: E0702 07:55:58.652347 2237 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:55:58.651000 audit[2262]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:58.651000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc721e240 a2=0 a3=7ffcc721e22c items=0 ppid=2237 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.651000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:58.654000 audit[2264]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:58.654000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd683088e0 a2=0 a3=7ffd683088cc items=0 ppid=2237 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:58.656035 kubelet[2237]: W0702 07:55:58.656008 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.654000 audit[2265]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:58.654000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcf01374c0 a2=0 a3=7ffcf01374ac items=0 ppid=2237 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:58.656412 kubelet[2237]: E0702 07:55:58.656398 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.655000 audit[2237]: AVC avc: denied { mac_admin } for pid=2237 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:58.655000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:58.655000 audit[2237]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008687b0 a1=c000f03d28 a2=c000868780 a3=25 items=0 ppid=1 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.655000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:58.657427 kubelet[2237]: I0702 07:55:58.657107 2237 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:55:58.657427 kubelet[2237]: I0702 07:55:58.657179 2237 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:55:58.657427 kubelet[2237]: I0702 07:55:58.657384 2237 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:55:58.656000 audit[2266]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:58.656000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7c130520 a2=0 a3=7fff7c13050c items=0 ppid=2237 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:58.659946 kubelet[2237]: E0702 07:55:58.658544 2237 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-195c2606d4\" not found" Jul 2 07:55:58.658000 audit[2267]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:58.658000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdd626f40 a2=0 a3=7fffdd626f2c items=0 ppid=2237 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:58.660000 audit[2268]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:58.660000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffabde4990 a2=0 a3=7fffabde497c items=0 ppid=2237 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:58.706316 kubelet[2237]: W0702 07:55:58.706244 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-195c2606d4&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.706316 kubelet[2237]: E0702 07:55:58.706318 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-195c2606d4&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.725067 kubelet[2237]: W0702 07:55:58.724995 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.725067 kubelet[2237]: E0702 07:55:58.725068 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.753281 kubelet[2237]: I0702 07:55:58.753231 2237 topology_manager.go:215] "Topology Admit Handler" podUID="79ab40356ee216c91ff445b5634a3e80" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.755088 kubelet[2237]: I0702 07:55:58.755057 2237 topology_manager.go:215] "Topology Admit Handler" podUID="a693cf10b9b69b5d378acb548b1f0768" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.756962 kubelet[2237]: I0702 07:55:58.756935 2237 topology_manager.go:215] "Topology Admit Handler" podUID="7db35eb3043c9721f348efb7be35a776" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.763712 systemd[1]: Created slice kubepods-burstable-pod79ab40356ee216c91ff445b5634a3e80.slice. Jul 2 07:55:58.772173 kubelet[2237]: E0702 07:55:58.771894 2237 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="1.6s" Jul 2 07:55:58.774433 systemd[1]: Created slice kubepods-burstable-poda693cf10b9b69b5d378acb548b1f0768.slice. Jul 2 07:55:58.777237 kubelet[2237]: I0702 07:55:58.777159 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777393 kubelet[2237]: I0702 07:55:58.777248 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777393 kubelet[2237]: I0702 07:55:58.777281 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777393 kubelet[2237]: I0702 07:55:58.777325 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777393 kubelet[2237]: I0702 07:55:58.777356 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777393 kubelet[2237]: I0702 07:55:58.777394 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777605 kubelet[2237]: I0702 07:55:58.777423 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777605 kubelet[2237]: I0702 07:55:58.777466 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.777605 kubelet[2237]: I0702 07:55:58.777509 2237 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7db35eb3043c9721f348efb7be35a776-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-195c2606d4\" (UID: \"7db35eb3043c9721f348efb7be35a776\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.780098 systemd[1]: Created slice kubepods-burstable-pod7db35eb3043c9721f348efb7be35a776.slice. Jul 2 07:55:58.822110 kubelet[2237]: W0702 07:55:58.821923 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.822110 kubelet[2237]: E0702 07:55:58.822010 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:58.876995 kubelet[2237]: I0702 07:55:58.876916 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:58.878717 kubelet[2237]: E0702 07:55:58.878681 2237 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:55:59.071345 env[1438]: time="2024-07-02T07:55:59.071289207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-195c2606d4,Uid:79ab40356ee216c91ff445b5634a3e80,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:59.080040 env[1438]: time="2024-07-02T07:55:59.079697332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-195c2606d4,Uid:a693cf10b9b69b5d378acb548b1f0768,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:59.083635 env[1438]: time="2024-07-02T07:55:59.083502189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-195c2606d4,Uid:7db35eb3043c9721f348efb7be35a776,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:59.485137 kubelet[2237]: E0702 07:55:59.485097 2237 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:59.726772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2786015491.mount: Deactivated successfully. Jul 2 07:55:59.762782 env[1438]: time="2024-07-02T07:55:59.762630465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.767390 env[1438]: time="2024-07-02T07:55:59.767334735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.782198 env[1438]: time="2024-07-02T07:55:59.782124455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.787678 env[1438]: time="2024-07-02T07:55:59.787550535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.792134 env[1438]: time="2024-07-02T07:55:59.792088303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.802597 env[1438]: time="2024-07-02T07:55:59.802484857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.808130 env[1438]: time="2024-07-02T07:55:59.808075840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.811651 env[1438]: time="2024-07-02T07:55:59.811601492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.815996 env[1438]: time="2024-07-02T07:55:59.815949457Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.821311 env[1438]: time="2024-07-02T07:55:59.821259435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.825335 env[1438]: time="2024-07-02T07:55:59.825292795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.828402 env[1438]: time="2024-07-02T07:55:59.828357941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:59.844162 kubelet[2237]: W0702 07:55:59.844119 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:59.844162 kubelet[2237]: E0702 07:55:59.844168 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:55:59.930527 env[1438]: time="2024-07-02T07:55:59.927793816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:59.930527 env[1438]: time="2024-07-02T07:55:59.927876517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:59.930527 env[1438]: time="2024-07-02T07:55:59.927895218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:59.930527 env[1438]: time="2024-07-02T07:55:59.928065520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47 pid=2276 runtime=io.containerd.runc.v2 Jul 2 07:55:59.932188 env[1438]: time="2024-07-02T07:55:59.932113180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:59.932188 env[1438]: time="2024-07-02T07:55:59.932149881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:59.932408 env[1438]: time="2024-07-02T07:55:59.932167381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:59.932408 env[1438]: time="2024-07-02T07:55:59.932300083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0265a1b11cf30d747bd11ee7d1f11a2ca08825bfa12e3b96abe1189ecf3c4555 pid=2289 runtime=io.containerd.runc.v2 Jul 2 07:55:59.950941 env[1438]: time="2024-07-02T07:55:59.950833058Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:59.951129 env[1438]: time="2024-07-02T07:55:59.950963760Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:59.951129 env[1438]: time="2024-07-02T07:55:59.950995860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:59.951252 env[1438]: time="2024-07-02T07:55:59.951192963Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860 pid=2310 runtime=io.containerd.runc.v2 Jul 2 07:55:59.957871 systemd[1]: Started cri-containerd-0265a1b11cf30d747bd11ee7d1f11a2ca08825bfa12e3b96abe1189ecf3c4555.scope. Jul 2 07:55:59.965548 systemd[1]: Started cri-containerd-43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47.scope. Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:59.998000 audit: BPF prog-id=59 op=LOAD Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2289 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363561316231316366333064373437626431316565376431663131 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2289 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363561316231316366333064373437626431316565376431663131 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.000000 audit: BPF prog-id=60 op=LOAD Jul 2 07:56:00.000000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218d40 items=0 ppid=2289 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363561316231316366333064373437626431316565376431663131 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit: BPF prog-id=61 op=LOAD Jul 2 07:56:00.001000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218d88 items=0 ppid=2289 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363561316231316366333064373437626431316565376431663131 Jul 2 07:56:00.001000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:56:00.001000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.001000 audit: BPF prog-id=62 op=LOAD Jul 2 07:56:00.001000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219198 items=0 ppid=2289 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363561316231316366333064373437626431316565376431663131 Jul 2 07:56:00.008529 systemd[1]: Started cri-containerd-70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860.scope. Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.014000 audit: BPF prog-id=63 op=LOAD Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2276 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626264643263313233373262636137366239663833323538613439 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2276 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626264643263313233373262636137366239663833323538613439 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit: BPF prog-id=64 op=LOAD Jul 2 07:56:00.015000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000319050 items=0 ppid=2276 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626264643263313233373262636137366239663833323538613439 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit: BPF prog-id=65 op=LOAD Jul 2 07:56:00.015000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000319098 items=0 ppid=2276 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626264643263313233373262636137366239663833323538613439 Jul 2 07:56:00.015000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:56:00.015000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.015000 audit: BPF prog-id=66 op=LOAD Jul 2 07:56:00.015000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003194a8 items=0 ppid=2276 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626264643263313233373262636137366239663833323538613439 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.051000 audit: BPF prog-id=67 op=LOAD Jul 2 07:56:00.051000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.051000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2310 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663239663339303663646435316539346333646466613562303131 Jul 2 07:56:00.051000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.051000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2310 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663239663339303663646435316539346333646466613562303131 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.052000 audit: BPF prog-id=68 op=LOAD Jul 2 07:56:00.052000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a2180 items=0 ppid=2310 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663239663339303663646435316539346333646466613562303131 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.053000 audit: BPF prog-id=69 op=LOAD Jul 2 07:56:00.053000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a21c8 items=0 ppid=2310 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663239663339303663646435316539346333646466613562303131 Jul 2 07:56:00.055000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:56:00.055000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.055000 audit: BPF prog-id=70 op=LOAD Jul 2 07:56:00.055000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a25d8 items=0 ppid=2310 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663239663339303663646435316539346333646466613562303131 Jul 2 07:56:00.083896 env[1438]: time="2024-07-02T07:56:00.078327328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-195c2606d4,Uid:79ab40356ee216c91ff445b5634a3e80,Namespace:kube-system,Attempt:0,} returns sandbox id \"0265a1b11cf30d747bd11ee7d1f11a2ca08825bfa12e3b96abe1189ecf3c4555\"" Jul 2 07:56:00.091809 env[1438]: time="2024-07-02T07:56:00.091738123Z" level=info msg="CreateContainer within sandbox \"0265a1b11cf30d747bd11ee7d1f11a2ca08825bfa12e3b96abe1189ecf3c4555\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:56:00.108873 env[1438]: time="2024-07-02T07:56:00.108781771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-195c2606d4,Uid:a693cf10b9b69b5d378acb548b1f0768,Namespace:kube-system,Attempt:0,} returns sandbox id \"43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47\"" Jul 2 07:56:00.112638 env[1438]: time="2024-07-02T07:56:00.112582326Z" level=info msg="CreateContainer within sandbox \"43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:56:00.127069 env[1438]: time="2024-07-02T07:56:00.127019036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-195c2606d4,Uid:7db35eb3043c9721f348efb7be35a776,Namespace:kube-system,Attempt:0,} returns sandbox id \"70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860\"" Jul 2 07:56:00.130859 env[1438]: time="2024-07-02T07:56:00.130789191Z" level=info msg="CreateContainer within sandbox \"70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:56:00.174746 env[1438]: time="2024-07-02T07:56:00.174675129Z" level=info msg="CreateContainer within sandbox \"0265a1b11cf30d747bd11ee7d1f11a2ca08825bfa12e3b96abe1189ecf3c4555\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0855ecebafb18c01887b33af21c29a1cb4879bc38c206f0da9d45d7028dff3c1\"" Jul 2 07:56:00.175568 env[1438]: time="2024-07-02T07:56:00.175528642Z" level=info msg="StartContainer for \"0855ecebafb18c01887b33af21c29a1cb4879bc38c206f0da9d45d7028dff3c1\"" Jul 2 07:56:00.199022 systemd[1]: Started cri-containerd-0855ecebafb18c01887b33af21c29a1cb4879bc38c206f0da9d45d7028dff3c1.scope. Jul 2 07:56:00.205705 env[1438]: time="2024-07-02T07:56:00.203939455Z" level=info msg="CreateContainer within sandbox \"43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e\"" Jul 2 07:56:00.205705 env[1438]: time="2024-07-02T07:56:00.204763067Z" level=info msg="StartContainer for \"106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e\"" Jul 2 07:56:00.218707 env[1438]: time="2024-07-02T07:56:00.218648369Z" level=info msg="CreateContainer within sandbox \"70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d\"" Jul 2 07:56:00.219293 env[1438]: time="2024-07-02T07:56:00.219251778Z" level=info msg="StartContainer for \"bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d\"" Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.222000 audit: BPF prog-id=71 op=LOAD Jul 2 07:56:00.223000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.223000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2289 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353565636562616662313863303138383762333361663231633239 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2289 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353565636562616662313863303138383762333361663231633239 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.224000 audit: BPF prog-id=72 op=LOAD Jul 2 07:56:00.224000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025080 items=0 ppid=2289 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353565636562616662313863303138383762333361663231633239 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.225000 audit: BPF prog-id=73 op=LOAD Jul 2 07:56:00.225000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000250c8 items=0 ppid=2289 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353565636562616662313863303138383762333361663231633239 Jul 2 07:56:00.226000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:56:00.226000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.226000 audit: BPF prog-id=74 op=LOAD Jul 2 07:56:00.226000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000254d8 items=0 ppid=2289 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353565636562616662313863303138383762333361663231633239 Jul 2 07:56:00.244671 systemd[1]: Started cri-containerd-106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e.scope. Jul 2 07:56:00.260828 systemd[1]: Started cri-containerd-bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d.scope. Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.290501 kernel: kauditd_printk_skb: 519 callbacks suppressed Jul 2 07:56:00.296250 kernel: audit: type=1400 audit(1719906960.278:500): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.425359 kernel: audit: type=1400 audit(1719906960.278:501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.425518 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:56:00.425545 kernel: audit: audit_lost=39 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:56:00.425565 kernel: audit: type=1400 audit(1719906960.278:502): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.425583 kernel: audit: backlog limit exceeded Jul 2 07:56:00.425604 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:56:00.425621 kernel: audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:56:00.425646 kernel: audit: type=1400 audit(1719906960.278:503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.425666 kernel: audit: backlog limit exceeded Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.427415 kubelet[2237]: E0702 07:56:00.427355 2237 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="3.2s" Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.283000 audit: BPF prog-id=75 op=LOAD Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2276 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366265366338623737656532613938306131616237313136653735 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2276 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366265366338623737656532613938306131616237313136653735 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit: BPF prog-id=76 op=LOAD Jul 2 07:56:00.312000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000354290 items=0 ppid=2276 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366265366338623737656532613938306131616237313136653735 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.312000 audit: BPF prog-id=77 op=LOAD Jul 2 07:56:00.312000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003542d8 items=0 ppid=2276 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366265366338623737656532613938306131616237313136653735 Jul 2 07:56:00.313000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:56:00.313000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.313000 audit: BPF prog-id=78 op=LOAD Jul 2 07:56:00.313000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003546e8 items=0 ppid=2276 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366265366338623737656532613938306131616237313136653735 Jul 2 07:56:00.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.448087 env[1438]: time="2024-07-02T07:56:00.448035407Z" level=info msg="StartContainer for \"0855ecebafb18c01887b33af21c29a1cb4879bc38c206f0da9d45d7028dff3c1\" returns successfully" Jul 2 07:56:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.444000 audit: BPF prog-id=79 op=LOAD Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2310 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366566386362643538633032663262666430393561343135353739 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2310 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366566386362643538633032663262666430393561343135353739 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit: BPF prog-id=80 op=LOAD Jul 2 07:56:00.447000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e94c0 items=0 ppid=2310 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366566386362643538633032663262666430393561343135353739 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit: BPF prog-id=81 op=LOAD Jul 2 07:56:00.447000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e9508 items=0 ppid=2310 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366566386362643538633032663262666430393561343135353739 Jul 2 07:56:00.447000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:56:00.447000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:00.447000 audit: BPF prog-id=82 op=LOAD Jul 2 07:56:00.447000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e9918 items=0 ppid=2310 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:00.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366566386362643538633032663262666430393561343135353739 Jul 2 07:56:00.474091 env[1438]: time="2024-07-02T07:56:00.474030085Z" level=info msg="StartContainer for \"106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e\" returns successfully" Jul 2 07:56:00.483830 kubelet[2237]: I0702 07:56:00.481832 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:00.491822 kubelet[2237]: E0702 07:56:00.491768 2237 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:00.573258 kubelet[2237]: W0702 07:56:00.573098 2237 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:56:00.573258 kubelet[2237]: E0702 07:56:00.573187 2237 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Jul 2 07:56:02.419000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:02.419000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa8000 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:02.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:02.419000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:02.419000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004d1a20 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:02.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:03.010000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.010000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0033f8210 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.010000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.014000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.014000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c004086f20 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.023000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.023000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c005ae3b60 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.023000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.027000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.027000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004656540 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.027000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.028000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.028000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c005ae3f50 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.028000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.028000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6374 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:03.028000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c005ae3fb0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:56:03.028000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:56:03.650483 kubelet[2237]: E0702 07:56:03.632430 2237 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-195c2606d4\" not found" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:03.670969 kubelet[2237]: E0702 07:56:03.670932 2237 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.5-a-195c2606d4" not found Jul 2 07:56:03.694138 kubelet[2237]: I0702 07:56:03.694098 2237 apiserver.go:52] "Watching apiserver" Jul 2 07:56:03.695161 kubelet[2237]: I0702 07:56:03.695137 2237 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:03.743614 env[1438]: time="2024-07-02T07:56:03.743495827Z" level=info msg="StartContainer for \"bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d\" returns successfully" Jul 2 07:56:04.692425 kubelet[2237]: I0702 07:56:04.692380 2237 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:56:04.693971 kubelet[2237]: I0702 07:56:04.693936 2237 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:04.716905 kubelet[2237]: W0702 07:56:04.716867 2237 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:04.717820 kubelet[2237]: W0702 07:56:04.717780 2237 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:04.718658 kubelet[2237]: W0702 07:56:04.718633 2237 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:06.532546 systemd[1]: Reloading. Jul 2 07:56:06.657140 /usr/lib/systemd/system-generators/torcx-generator[2534]: time="2024-07-02T07:56:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:56:06.657176 /usr/lib/systemd/system-generators/torcx-generator[2534]: time="2024-07-02T07:56:06Z" level=info msg="torcx already run" Jul 2 07:56:06.685000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6401 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:56:06.713095 kernel: kauditd_printk_skb: 132 callbacks suppressed Jul 2 07:56:06.714344 kernel: audit: type=1400 audit(1719906966.685:542): avc: denied { watch } for pid=2456 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6401 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:56:06.685000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aeec80 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:06.773482 kernel: audit: type=1300 audit(1719906966.685:542): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aeec80 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:06.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:06.813843 kernel: audit: type=1327 audit(1719906966.685:542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:06.944119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:56:06.944140 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:56:06.993874 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.160081 kernel: audit: type=1400 audit(1719906967.120:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.160250 kernel: audit: type=1400 audit(1719906967.120:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.160289 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.166538 kernel: audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:56:07.166669 kernel: audit: backlog limit exceeded Jul 2 07:56:07.188866 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:56:07.189035 kernel: audit: type=1400 audit(1719906967.120:545): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit: BPF prog-id=83 op=LOAD Jul 2 07:56:07.137000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit: BPF prog-id=84 op=LOAD Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.137000 audit: BPF prog-id=85 op=LOAD Jul 2 07:56:07.137000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:56:07.137000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.139000 audit: BPF prog-id=86 op=LOAD Jul 2 07:56:07.139000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit: BPF prog-id=87 op=LOAD Jul 2 07:56:07.154000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.195000 audit: BPF prog-id=97 op=LOAD Jul 2 07:56:07.195000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.197000 audit: BPF prog-id=98 op=LOAD Jul 2 07:56:07.197000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.198000 audit: BPF prog-id=99 op=LOAD Jul 2 07:56:07.198000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.200000 audit: BPF prog-id=100 op=LOAD Jul 2 07:56:07.200000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit: BPF prog-id=101 op=LOAD Jul 2 07:56:07.202000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.202000 audit: BPF prog-id=102 op=LOAD Jul 2 07:56:07.202000 audit: BPF prog-id=71 op=UNLOAD Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:07.203000 audit: BPF prog-id=103 op=LOAD Jul 2 07:56:07.203000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:56:07.223439 systemd[1]: Stopping kubelet.service... Jul 2 07:56:07.223976 kubelet[2237]: I0702 07:56:07.223727 2237 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:56:07.242224 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:56:07.242491 systemd[1]: Stopped kubelet.service. Jul 2 07:56:07.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:07.245070 systemd[1]: Starting kubelet.service... Jul 2 07:56:07.484000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:07.484000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000eb0e20 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:07.484000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:07.485000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:07.485000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000eb10a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:07.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:07.487000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:07.487000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000eb12c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:07.487000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:07.488000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:07.488000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000eb1900 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:56:07.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:10.936695 systemd[1]: Started kubelet.service. Jul 2 07:56:10.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.010638 kubelet[2596]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:56:11.011384 kubelet[2596]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:56:11.011468 kubelet[2596]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:56:11.011699 kubelet[2596]: I0702 07:56:11.011659 2596 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:56:11.018439 kubelet[2596]: I0702 07:56:11.018403 2596 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:56:11.018439 kubelet[2596]: I0702 07:56:11.018431 2596 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:56:11.018709 kubelet[2596]: I0702 07:56:11.018687 2596 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:56:11.020617 kubelet[2596]: I0702 07:56:11.020590 2596 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:56:11.021756 kubelet[2596]: I0702 07:56:11.021715 2596 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:56:11.031270 kubelet[2596]: I0702 07:56:11.031226 2596 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:56:11.031584 kubelet[2596]: I0702 07:56:11.031561 2596 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:56:11.032034 kubelet[2596]: I0702 07:56:11.032000 2596 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:56:11.032254 kubelet[2596]: I0702 07:56:11.032242 2596 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:56:11.032315 kubelet[2596]: I0702 07:56:11.032309 2596 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:56:11.032397 kubelet[2596]: I0702 07:56:11.032391 2596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:56:11.034830 kubelet[2596]: I0702 07:56:11.034808 2596 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:56:11.034973 kubelet[2596]: I0702 07:56:11.034961 2596 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:56:11.035071 kubelet[2596]: I0702 07:56:11.035062 2596 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:56:11.035148 kubelet[2596]: I0702 07:56:11.035133 2596 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:56:11.042865 kubelet[2596]: I0702 07:56:11.042836 2596 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:56:11.043710 kubelet[2596]: I0702 07:56:11.043691 2596 server.go:1232] "Started kubelet" Jul 2 07:56:11.044000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:11.044000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:56:11.044000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007c0450 a1=c0007c42a0 a2=c0007c0420 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:56:11.046531 kubelet[2596]: I0702 07:56:11.046513 2596 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:56:11.044000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:11.044000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:56:11.044000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7f740 a1=c0007c42b8 a2=c0007c04e0 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:56:11.047090 kubelet[2596]: I0702 07:56:11.047074 2596 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:56:11.047200 kubelet[2596]: I0702 07:56:11.047189 2596 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:56:11.058426 kubelet[2596]: E0702 07:56:11.058380 2596 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:56:11.058690 kubelet[2596]: E0702 07:56:11.058511 2596 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:56:11.062110 kubelet[2596]: I0702 07:56:11.062075 2596 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:56:11.064095 kubelet[2596]: I0702 07:56:11.064069 2596 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:56:11.067203 kubelet[2596]: I0702 07:56:11.067120 2596 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:56:11.067660 kubelet[2596]: I0702 07:56:11.067642 2596 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:56:11.079954 kubelet[2596]: I0702 07:56:11.079755 2596 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:56:11.084248 kubelet[2596]: I0702 07:56:11.084221 2596 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:56:11.084585 kubelet[2596]: I0702 07:56:11.084571 2596 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:56:11.086917 kubelet[2596]: I0702 07:56:11.086898 2596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:56:11.088384 kubelet[2596]: I0702 07:56:11.088369 2596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:56:11.088506 kubelet[2596]: I0702 07:56:11.088498 2596 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:56:11.088580 kubelet[2596]: I0702 07:56:11.088573 2596 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:56:11.088721 kubelet[2596]: E0702 07:56:11.088689 2596 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:56:11.172614 kubelet[2596]: I0702 07:56:11.172575 2596 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:56:11.172614 kubelet[2596]: I0702 07:56:11.172601 2596 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:56:11.172614 kubelet[2596]: I0702 07:56:11.172622 2596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:56:11.173007 kubelet[2596]: I0702 07:56:11.172943 2596 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:56:11.173007 kubelet[2596]: I0702 07:56:11.172984 2596 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:56:11.173007 kubelet[2596]: I0702 07:56:11.172994 2596 policy_none.go:49] "None policy: Start" Jul 2 07:56:11.173877 kubelet[2596]: I0702 07:56:11.173835 2596 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:56:11.173877 kubelet[2596]: I0702 07:56:11.173872 2596 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:56:11.174125 kubelet[2596]: I0702 07:56:11.174103 2596 state_mem.go:75] "Updated machine memory state" Jul 2 07:56:11.177990 kubelet[2596]: I0702 07:56:11.177965 2596 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:56:11.176000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:11.176000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:56:11.176000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c59620 a1=c000b71b90 a2=c000c595f0 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:56:11.178424 kubelet[2596]: I0702 07:56:11.178044 2596 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:56:11.179908 kubelet[2596]: I0702 07:56:11.178634 2596 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:56:11.187299 kubelet[2596]: I0702 07:56:11.186341 2596 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.191454 kubelet[2596]: I0702 07:56:11.190164 2596 topology_manager.go:215] "Topology Admit Handler" podUID="79ab40356ee216c91ff445b5634a3e80" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.191454 kubelet[2596]: I0702 07:56:11.190613 2596 topology_manager.go:215] "Topology Admit Handler" podUID="a693cf10b9b69b5d378acb548b1f0768" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.191454 kubelet[2596]: I0702 07:56:11.190681 2596 topology_manager.go:215] "Topology Admit Handler" podUID="7db35eb3043c9721f348efb7be35a776" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.217978 kubelet[2596]: W0702 07:56:11.217929 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:11.218217 kubelet[2596]: W0702 07:56:11.218200 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:11.218307 kubelet[2596]: E0702 07:56:11.218267 2596 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.220047 kubelet[2596]: E0702 07:56:11.218368 2596 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.220047 kubelet[2596]: I0702 07:56:11.218840 2596 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.220047 kubelet[2596]: I0702 07:56:11.218919 2596 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.220528 kubelet[2596]: W0702 07:56:11.220510 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:56:11.221099 kubelet[2596]: E0702 07:56:11.221074 2596 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.5-a-195c2606d4\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.285230 kubelet[2596]: I0702 07:56:11.285163 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.285230 kubelet[2596]: I0702 07:56:11.285229 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286386 kubelet[2596]: I0702 07:56:11.285263 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286386 kubelet[2596]: I0702 07:56:11.286103 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286386 kubelet[2596]: I0702 07:56:11.286194 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286386 kubelet[2596]: I0702 07:56:11.286251 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286814 kubelet[2596]: I0702 07:56:11.286783 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7db35eb3043c9721f348efb7be35a776-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-195c2606d4\" (UID: \"7db35eb3043c9721f348efb7be35a776\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.286930 kubelet[2596]: I0702 07:56:11.286891 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/79ab40356ee216c91ff445b5634a3e80-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-195c2606d4\" (UID: \"79ab40356ee216c91ff445b5634a3e80\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:11.287015 kubelet[2596]: I0702 07:56:11.286941 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a693cf10b9b69b5d378acb548b1f0768-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-195c2606d4\" (UID: \"a693cf10b9b69b5d378acb548b1f0768\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" Jul 2 07:56:12.037463 kubelet[2596]: I0702 07:56:12.037406 2596 apiserver.go:52] "Watching apiserver" Jul 2 07:56:12.084768 kubelet[2596]: I0702 07:56:12.084709 2596 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:56:12.145779 kubelet[2596]: I0702 07:56:12.145738 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-195c2606d4" podStartSLOduration=8.145686992 podCreationTimestamp="2024-07-02 07:56:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:12.145467989 +0000 UTC m=+1.193358508" watchObservedRunningTime="2024-07-02 07:56:12.145686992 +0000 UTC m=+1.193577511" Jul 2 07:56:12.161423 kubelet[2596]: I0702 07:56:12.161375 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" podStartSLOduration=8.161330975 podCreationTimestamp="2024-07-02 07:56:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:12.152878376 +0000 UTC m=+1.200768895" watchObservedRunningTime="2024-07-02 07:56:12.161330975 +0000 UTC m=+1.209221494" Jul 2 07:56:12.161646 kubelet[2596]: I0702 07:56:12.161494 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-195c2606d4" podStartSLOduration=8.161473477 podCreationTimestamp="2024-07-02 07:56:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:12.161313775 +0000 UTC m=+1.209204194" watchObservedRunningTime="2024-07-02 07:56:12.161473477 +0000 UTC m=+1.209363896" Jul 2 07:56:16.721438 sudo[1877]: pam_unix(sudo:session): session closed for user root Jul 2 07:56:16.720000 audit[1877]: USER_END pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.726510 kernel: kauditd_printk_skb: 443 callbacks suppressed Jul 2 07:56:16.729038 kernel: audit: type=1106 audit(1719906976.720:706): pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.725000 audit[1877]: CRED_DISP pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.766389 kernel: audit: type=1104 audit(1719906976.725:707): pid=1877 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.832580 sshd[1874]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:16.833000 audit[1874]: USER_END pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:56:16.836593 systemd[1]: sshd@6-10.200.8.4:22-10.200.16.10:39818.service: Deactivated successfully. Jul 2 07:56:16.837510 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:56:16.837682 systemd[1]: session-9.scope: Consumed 4.714s CPU time. Jul 2 07:56:16.839222 systemd-logind[1424]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:56:16.840347 systemd-logind[1424]: Removed session 9. Jul 2 07:56:16.833000 audit[1874]: CRED_DISP pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:56:16.878362 kernel: audit: type=1106 audit(1719906976.833:708): pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:56:16.878582 kernel: audit: type=1104 audit(1719906976.833:709): pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:56:16.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:16.897825 kernel: audit: type=1131 audit(1719906976.836:710): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.647275 kubelet[2596]: I0702 07:56:19.647228 2596 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:56:19.648195 env[1438]: time="2024-07-02T07:56:19.648148968Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:56:19.648681 kubelet[2596]: I0702 07:56:19.648657 2596 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:56:20.157026 kubelet[2596]: I0702 07:56:20.156979 2596 topology_manager.go:215] "Topology Admit Handler" podUID="978d130e-d967-4c76-a957-7f499291b3de" podNamespace="kube-system" podName="kube-proxy-wptmp" Jul 2 07:56:20.164132 systemd[1]: Created slice kubepods-besteffort-pod978d130e_d967_4c76_a957_7f499291b3de.slice. Jul 2 07:56:20.260927 kubelet[2596]: I0702 07:56:20.260881 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/978d130e-d967-4c76-a957-7f499291b3de-xtables-lock\") pod \"kube-proxy-wptmp\" (UID: \"978d130e-d967-4c76-a957-7f499291b3de\") " pod="kube-system/kube-proxy-wptmp" Jul 2 07:56:20.261167 kubelet[2596]: I0702 07:56:20.260943 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/978d130e-d967-4c76-a957-7f499291b3de-kube-proxy\") pod \"kube-proxy-wptmp\" (UID: \"978d130e-d967-4c76-a957-7f499291b3de\") " pod="kube-system/kube-proxy-wptmp" Jul 2 07:56:20.261167 kubelet[2596]: I0702 07:56:20.260972 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zq74v\" (UniqueName: \"kubernetes.io/projected/978d130e-d967-4c76-a957-7f499291b3de-kube-api-access-zq74v\") pod \"kube-proxy-wptmp\" (UID: \"978d130e-d967-4c76-a957-7f499291b3de\") " pod="kube-system/kube-proxy-wptmp" Jul 2 07:56:20.261167 kubelet[2596]: I0702 07:56:20.261002 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/978d130e-d967-4c76-a957-7f499291b3de-lib-modules\") pod \"kube-proxy-wptmp\" (UID: \"978d130e-d967-4c76-a957-7f499291b3de\") " pod="kube-system/kube-proxy-wptmp" Jul 2 07:56:20.474492 env[1438]: time="2024-07-02T07:56:20.474431379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wptmp,Uid:978d130e-d967-4c76-a957-7f499291b3de,Namespace:kube-system,Attempt:0,}" Jul 2 07:56:20.515070 env[1438]: time="2024-07-02T07:56:20.514987299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:20.515070 env[1438]: time="2024-07-02T07:56:20.515026500Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:20.515346 env[1438]: time="2024-07-02T07:56:20.515304003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:20.515709 env[1438]: time="2024-07-02T07:56:20.515613506Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b309cde620b1b129878af7a941c4d2ce46b8de1176817f27142a7ede20a7f72 pid=2676 runtime=io.containerd.runc.v2 Jul 2 07:56:20.537410 systemd[1]: Started cri-containerd-3b309cde620b1b129878af7a941c4d2ce46b8de1176817f27142a7ede20a7f72.scope. Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.595051 kernel: audit: type=1400 audit(1719906980.572:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.603019 kubelet[2596]: I0702 07:56:20.599545 2596 topology_manager.go:215] "Topology Admit Handler" podUID="07e32447-7804-4348-9644-12fa42ee5a00" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-dhv9n" Jul 2 07:56:20.608906 kubelet[2596]: W0702 07:56:20.608787 2596 reflector.go:535] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-195c2606d4" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-195c2606d4' and this object Jul 2 07:56:20.608906 kubelet[2596]: E0702 07:56:20.608867 2596 reflector.go:147] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-195c2606d4" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.5-a-195c2606d4' and this object Jul 2 07:56:20.612847 kernel: audit: type=1400 audit(1719906980.572:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.630995 kernel: audit: type=1400 audit(1719906980.572:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.635522 systemd[1]: Created slice kubepods-besteffort-pod07e32447_7804_4348_9644_12fa42ee5a00.slice. Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.653817 kernel: audit: type=1400 audit(1719906980.572:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.669037 kubelet[2596]: I0702 07:56:20.663440 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/07e32447-7804-4348-9644-12fa42ee5a00-var-lib-calico\") pod \"tigera-operator-76c4974c85-dhv9n\" (UID: \"07e32447-7804-4348-9644-12fa42ee5a00\") " pod="tigera-operator/tigera-operator-76c4974c85-dhv9n" Jul 2 07:56:20.669037 kubelet[2596]: I0702 07:56:20.663476 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9vp5c\" (UniqueName: \"kubernetes.io/projected/07e32447-7804-4348-9644-12fa42ee5a00-kube-api-access-9vp5c\") pod \"tigera-operator-76c4974c85-dhv9n\" (UID: \"07e32447-7804-4348-9644-12fa42ee5a00\") " pod="tigera-operator/tigera-operator-76c4974c85-dhv9n" Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.573000 audit: BPF prog-id=104 op=LOAD Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2676 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.677208 kernel: audit: type=1400 audit(1719906980.572:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362333039636465363230623162313239383738616637613934316334 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2676 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362333039636465363230623162313239383738616637613934316334 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit: BPF prog-id=105 op=LOAD Jul 2 07:56:20.596000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024f490 items=0 ppid=2676 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362333039636465363230623162313239383738616637613934316334 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit: BPF prog-id=106 op=LOAD Jul 2 07:56:20.596000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024f4d8 items=0 ppid=2676 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362333039636465363230623162313239383738616637613934316334 Jul 2 07:56:20.596000 audit: BPF prog-id=106 op=UNLOAD Jul 2 07:56:20.596000 audit: BPF prog-id=105 op=UNLOAD Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.596000 audit: BPF prog-id=107 op=LOAD Jul 2 07:56:20.596000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024f8e8 items=0 ppid=2676 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362333039636465363230623162313239383738616637613934316334 Jul 2 07:56:20.682755 env[1438]: time="2024-07-02T07:56:20.682709837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wptmp,Uid:978d130e-d967-4c76-a957-7f499291b3de,Namespace:kube-system,Attempt:0,} returns sandbox id \"3b309cde620b1b129878af7a941c4d2ce46b8de1176817f27142a7ede20a7f72\"" Jul 2 07:56:20.688032 env[1438]: time="2024-07-02T07:56:20.687999291Z" level=info msg="CreateContainer within sandbox \"3b309cde620b1b129878af7a941c4d2ce46b8de1176817f27142a7ede20a7f72\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:56:20.738521 env[1438]: time="2024-07-02T07:56:20.738355513Z" level=info msg="CreateContainer within sandbox \"3b309cde620b1b129878af7a941c4d2ce46b8de1176817f27142a7ede20a7f72\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"09f1d1d2acf8cfd005673e839de32bc47d804e5049016c582e0a2dc8276fba6a\"" Jul 2 07:56:20.740604 env[1438]: time="2024-07-02T07:56:20.740566936Z" level=info msg="StartContainer for \"09f1d1d2acf8cfd005673e839de32bc47d804e5049016c582e0a2dc8276fba6a\"" Jul 2 07:56:20.759501 systemd[1]: Started cri-containerd-09f1d1d2acf8cfd005673e839de32bc47d804e5049016c582e0a2dc8276fba6a.scope. Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1cc15789f8 items=0 ppid=2676 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663164316432616366386366643030353637336538333964653332 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit: BPF prog-id=108 op=LOAD Jul 2 07:56:20.782000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022e6b8 items=0 ppid=2676 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663164316432616366386366643030353637336538333964653332 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit: BPF prog-id=109 op=LOAD Jul 2 07:56:20.782000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022e708 items=0 ppid=2676 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663164316432616366386366643030353637336538333964653332 Jul 2 07:56:20.782000 audit: BPF prog-id=109 op=UNLOAD Jul 2 07:56:20.782000 audit: BPF prog-id=108 op=UNLOAD Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.782000 audit: BPF prog-id=110 op=LOAD Jul 2 07:56:20.782000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022e798 items=0 ppid=2676 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663164316432616366386366643030353637336538333964653332 Jul 2 07:56:20.809487 env[1438]: time="2024-07-02T07:56:20.809428649Z" level=info msg="StartContainer for \"09f1d1d2acf8cfd005673e839de32bc47d804e5049016c582e0a2dc8276fba6a\" returns successfully" Jul 2 07:56:20.881000 audit[2770]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:20.881000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff32a1ffc0 a2=0 a3=7fff32a1ffac items=0 ppid=2730 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:56:20.883000 audit[2771]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.883000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5707d490 a2=0 a3=7ffe5707d47c items=0 ppid=2730 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:56:20.886000 audit[2772]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.886000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd177c360 a2=0 a3=7fffd177c34c items=0 ppid=2730 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:56:20.888000 audit[2773]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.888000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1e93f000 a2=0 a3=7fff1e93efec items=0 ppid=2730 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:56:20.890000 audit[2774]: NETFILTER_CFG table=nat:48 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:20.890000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe4607df0 a2=0 a3=7fffe4607ddc items=0 ppid=2730 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:56:20.893000 audit[2775]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:20.893000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0a7f0cc0 a2=0 a3=7ffe0a7f0cac items=0 ppid=2730 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:56:20.986000 audit[2776]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.986000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc5d815330 a2=0 a3=7ffc5d81531c items=0 ppid=2730 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:56:20.989000 audit[2778]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.989000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff99e819a0 a2=0 a3=7fff99e8198c items=0 ppid=2730 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:56:20.995000 audit[2781]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.995000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff226f3bb0 a2=0 a3=7fff226f3b9c items=0 ppid=2730 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:56:20.997000 audit[2782]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:20.997000 audit[2782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedc15bd90 a2=0 a3=7ffedc15bd7c items=0 ppid=2730 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:56:21.002000 audit[2784]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.002000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa5f03520 a2=0 a3=7fffa5f0350c items=0 ppid=2730 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:56:21.005000 audit[2785]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.005000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf4ede440 a2=0 a3=7ffdf4ede42c items=0 ppid=2730 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:56:21.012000 audit[2787]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.012000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd48bd72c0 a2=0 a3=7ffd48bd72ac items=0 ppid=2730 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:56:21.021000 audit[2790]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.021000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb1143550 a2=0 a3=7ffdb114353c items=0 ppid=2730 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:56:21.023000 audit[2791]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.023000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff78770100 a2=0 a3=7fff787700ec items=0 ppid=2730 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:56:21.026000 audit[2793]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.026000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca82b3b00 a2=0 a3=7ffca82b3aec items=0 ppid=2730 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:56:21.028000 audit[2794]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.028000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0f091110 a2=0 a3=7fff0f0910fc items=0 ppid=2730 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:56:21.031000 audit[2796]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.031000 audit[2796]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcdd2b0a0 a2=0 a3=7fffcdd2b08c items=0 ppid=2730 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:56:21.035000 audit[2799]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.035000 audit[2799]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd24302fe0 a2=0 a3=7ffd24302fcc items=0 ppid=2730 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:56:21.040000 audit[2802]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.040000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6397faf0 a2=0 a3=7fff6397fadc items=0 ppid=2730 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:56:21.041000 audit[2803]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.041000 audit[2803]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffea75fbd0 a2=0 a3=7fffea75fbbc items=0 ppid=2730 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:56:21.044000 audit[2805]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.044000 audit[2805]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff3031acf0 a2=0 a3=7fff3031acdc items=0 ppid=2730 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:56:21.048000 audit[2808]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.048000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeeda0ce10 a2=0 a3=7ffeeda0cdfc items=0 ppid=2730 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:56:21.049000 audit[2809]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.049000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3fab2040 a2=0 a3=7ffe3fab202c items=0 ppid=2730 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:56:21.056000 audit[2811]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:21.056000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff79d65380 a2=0 a3=7fff79d6536c items=0 ppid=2730 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:56:21.148000 audit[2817]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.148000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc3bd5da70 a2=0 a3=7ffc3bd5da5c items=0 ppid=2730 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.158739 kubelet[2596]: I0702 07:56:21.158694 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wptmp" podStartSLOduration=1.158626942 podCreationTimestamp="2024-07-02 07:56:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:21.158262439 +0000 UTC m=+10.206152958" watchObservedRunningTime="2024-07-02 07:56:21.158626942 +0000 UTC m=+10.206517361" Jul 2 07:56:21.174000 audit[2817]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.174000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc3bd5da70 a2=0 a3=7ffc3bd5da5c items=0 ppid=2730 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.176000 audit[2823]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.176000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3e736210 a2=0 a3=7ffd3e7361fc items=0 ppid=2730 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:56:21.181000 audit[2825]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.181000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb6995820 a2=0 a3=7ffeb699580c items=0 ppid=2730 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:56:21.189000 audit[2828]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.189000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdce455d20 a2=0 a3=7ffdce455d0c items=0 ppid=2730 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:56:21.191000 audit[2829]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.191000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd08d45a70 a2=0 a3=7ffd08d45a5c items=0 ppid=2730 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:56:21.199000 audit[2831]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.199000 audit[2831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee5c2bab0 a2=0 a3=7ffee5c2ba9c items=0 ppid=2730 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:56:21.202000 audit[2832]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.202000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd704f2870 a2=0 a3=7ffd704f285c items=0 ppid=2730 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:56:21.210000 audit[2834]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.210000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf36ec8d0 a2=0 a3=7ffcf36ec8bc items=0 ppid=2730 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:56:21.221000 audit[2838]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.221000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe83696f60 a2=0 a3=7ffe83696f4c items=0 ppid=2730 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:56:21.223000 audit[2839]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.223000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb4b91150 a2=0 a3=7ffeb4b9113c items=0 ppid=2730 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:56:21.231000 audit[2841]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.231000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff65f14b20 a2=0 a3=7fff65f14b0c items=0 ppid=2730 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:56:21.232000 audit[2842]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.232000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffaf9f1cf0 a2=0 a3=7fffaf9f1cdc items=0 ppid=2730 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:56:21.235000 audit[2844]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.235000 audit[2844]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5d751080 a2=0 a3=7ffe5d75106c items=0 ppid=2730 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:56:21.239000 audit[2847]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.239000 audit[2847]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd670051c0 a2=0 a3=7ffd670051ac items=0 ppid=2730 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:56:21.243000 audit[2850]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.243000 audit[2850]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0699ea80 a2=0 a3=7ffc0699ea6c items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:56:21.245000 audit[2851]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.245000 audit[2851]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcb5c7c220 a2=0 a3=7ffcb5c7c20c items=0 ppid=2730 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:56:21.249000 audit[2853]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.249000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffeaabc530 a2=0 a3=7fffeaabc51c items=0 ppid=2730 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:56:21.252000 audit[2856]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.252000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe380d5560 a2=0 a3=7ffe380d554c items=0 ppid=2730 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:56:21.254000 audit[2857]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.254000 audit[2857]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebf92f470 a2=0 a3=7ffebf92f45c items=0 ppid=2730 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:56:21.256000 audit[2859]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.256000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffea43b86f0 a2=0 a3=7ffea43b86dc items=0 ppid=2730 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:56:21.258000 audit[2860]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.258000 audit[2860]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcd215280 a2=0 a3=7ffdcd21526c items=0 ppid=2730 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:56:21.260000 audit[2862]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.260000 audit[2862]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff35be2a60 a2=0 a3=7fff35be2a4c items=0 ppid=2730 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:56:21.264000 audit[2865]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:56:21.264000 audit[2865]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff443eb5f0 a2=0 a3=7fff443eb5dc items=0 ppid=2730 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:56:21.267000 audit[2867]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:56:21.267000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcfffe21a0 a2=0 a3=7ffcfffe218c items=0 ppid=2730 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.267000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.268000 audit[2867]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:56:21.268000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcfffe21a0 a2=0 a3=7ffcfffe218c items=0 ppid=2730 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.268000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.376469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2934951974.mount: Deactivated successfully. Jul 2 07:56:21.841958 env[1438]: time="2024-07-02T07:56:21.841895118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-dhv9n,Uid:07e32447-7804-4348-9644-12fa42ee5a00,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:56:21.890533 env[1438]: time="2024-07-02T07:56:21.890210211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:21.890533 env[1438]: time="2024-07-02T07:56:21.890260612Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:21.890533 env[1438]: time="2024-07-02T07:56:21.890271012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:21.890533 env[1438]: time="2024-07-02T07:56:21.890431814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1 pid=2877 runtime=io.containerd.runc.v2 Jul 2 07:56:21.915940 systemd[1]: Started cri-containerd-798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1.scope. Jul 2 07:56:21.948184 kernel: kauditd_printk_skb: 248 callbacks suppressed Jul 2 07:56:21.948352 kernel: audit: type=1400 audit(1719906981.928:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.963942 kernel: audit: type=1400 audit(1719906981.928:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.995618 kernel: audit: type=1400 audit(1719906981.928:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.995732 kernel: audit: type=1400 audit(1719906981.928:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.025875 kernel: audit: type=1400 audit(1719906981.928:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.026035 kernel: audit: type=1400 audit(1719906981.928:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.041842 kernel: audit: type=1400 audit(1719906981.928:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.059504 env[1438]: time="2024-07-02T07:56:22.059455931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-dhv9n,Uid:07e32447-7804-4348-9644-12fa42ee5a00,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1\"" Jul 2 07:56:22.064217 env[1438]: time="2024-07-02T07:56:22.064110978Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:56:22.069829 kernel: audit: type=1400 audit(1719906981.928:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.069962 kernel: audit: type=1400 audit(1719906981.928:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.091199 kernel: audit: type=1400 audit(1719906981.933:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit: BPF prog-id=111 op=LOAD Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2877 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386134643562326663633737383633383234366362626131613062 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2877 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386134643562326663633737383633383234366362626131613062 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.933000 audit: BPF prog-id=112 op=LOAD Jul 2 07:56:21.933000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f5d90 items=0 ppid=2877 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386134643562326663633737383633383234366362626131613062 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.947000 audit: BPF prog-id=113 op=LOAD Jul 2 07:56:21.947000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000225618 items=0 ppid=2877 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386134643562326663633737383633383234366362626131613062 Jul 2 07:56:21.947000 audit: BPF prog-id=113 op=UNLOAD Jul 2 07:56:21.947000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.948000 audit: BPF prog-id=114 op=LOAD Jul 2 07:56:21.948000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000225a28 items=0 ppid=2877 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386134643562326663633737383633383234366362626131613062 Jul 2 07:56:23.965513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1163855930.mount: Deactivated successfully. Jul 2 07:56:24.839594 env[1438]: time="2024-07-02T07:56:24.839535348Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.845272 env[1438]: time="2024-07-02T07:56:24.845221604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.850275 env[1438]: time="2024-07-02T07:56:24.850230853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.853580 env[1438]: time="2024-07-02T07:56:24.853526385Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.854022 env[1438]: time="2024-07-02T07:56:24.853984290Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:56:24.856439 env[1438]: time="2024-07-02T07:56:24.856404913Z" level=info msg="CreateContainer within sandbox \"798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:56:24.885434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1550717549.mount: Deactivated successfully. Jul 2 07:56:24.894465 env[1438]: time="2024-07-02T07:56:24.894414086Z" level=info msg="CreateContainer within sandbox \"798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3\"" Jul 2 07:56:24.895349 env[1438]: time="2024-07-02T07:56:24.895315995Z" level=info msg="StartContainer for \"a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3\"" Jul 2 07:56:24.924660 systemd[1]: Started cri-containerd-a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3.scope. Jul 2 07:56:24.929253 systemd[1]: run-containerd-runc-k8s.io-a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3-runc.1V2bEN.mount: Deactivated successfully. Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit: BPF prog-id=115 op=LOAD Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2877 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353239306262393336303636666663303539396537373863323466 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2877 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353239306262393336303636666663303539396537373863323466 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit: BPF prog-id=116 op=LOAD Jul 2 07:56:24.947000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038efe0 items=0 ppid=2877 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353239306262393336303636666663303539396537373863323466 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.947000 audit: BPF prog-id=117 op=LOAD Jul 2 07:56:24.947000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038f028 items=0 ppid=2877 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353239306262393336303636666663303539396537373863323466 Jul 2 07:56:24.948000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:56:24.948000 audit: BPF prog-id=116 op=UNLOAD Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.948000 audit: BPF prog-id=118 op=LOAD Jul 2 07:56:24.948000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038f438 items=0 ppid=2877 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353239306262393336303636666663303539396537373863323466 Jul 2 07:56:24.972253 env[1438]: time="2024-07-02T07:56:24.972197447Z" level=info msg="StartContainer for \"a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3\" returns successfully" Jul 2 07:56:27.862000 audit[2954]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.871091 kernel: kauditd_printk_skb: 104 callbacks suppressed Jul 2 07:56:27.872397 kernel: audit: type=1325 audit(1719906987.862:822): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.888688 kernel: audit: type=1300 audit(1719906987.862:822): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd39f3e940 a2=0 a3=7ffd39f3e92c items=0 ppid=2730 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.862000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd39f3e940 a2=0 a3=7ffd39f3e92c items=0 ppid=2730 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:27.941806 kernel: audit: type=1327 audit(1719906987.862:822): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:27.863000 audit[2954]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.863000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd39f3e940 a2=0 a3=0 items=0 ppid=2730 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.994060 kernel: audit: type=1325 audit(1719906987.863:823): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.994211 kernel: audit: type=1300 audit(1719906987.863:823): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd39f3e940 a2=0 a3=0 items=0 ppid=2730 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.994238 kernel: audit: type=1327 audit(1719906987.863:823): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:27.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:27.908000 audit[2956]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:27.908000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd45a38a50 a2=0 a3=7ffd45a38a3c items=0 ppid=2730 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.063974 kernel: audit: type=1325 audit(1719906987.908:824): table=filter:97 family=2 entries=16 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:28.064132 kernel: audit: type=1300 audit(1719906987.908:824): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd45a38a50 a2=0 a3=7ffd45a38a3c items=0 ppid=2730 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:28.084842 kernel: audit: type=1327 audit(1719906987.908:824): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:28.085002 kernel: audit: type=1325 audit(1719906988.002:825): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:28.002000 audit[2956]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:28.002000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd45a38a50 a2=0 a3=0 items=0 ppid=2730 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:28.102143 kubelet[2596]: I0702 07:56:28.102096 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-dhv9n" podStartSLOduration=5.30889234 podCreationTimestamp="2024-07-02 07:56:20 +0000 UTC" firstStartedPulling="2024-07-02 07:56:22.06131315 +0000 UTC m=+11.109203569" lastFinishedPulling="2024-07-02 07:56:24.854464494 +0000 UTC m=+13.902354913" observedRunningTime="2024-07-02 07:56:25.177093631 +0000 UTC m=+14.224984050" watchObservedRunningTime="2024-07-02 07:56:28.102043684 +0000 UTC m=+17.149934103" Jul 2 07:56:28.102703 kubelet[2596]: I0702 07:56:28.102359 2596 topology_manager.go:215] "Topology Admit Handler" podUID="877b4276-dbab-4395-bd14-f06bcd6c74a0" podNamespace="calico-system" podName="calico-typha-58b89b86d6-l4vkl" Jul 2 07:56:28.108617 systemd[1]: Created slice kubepods-besteffort-pod877b4276_dbab_4395_bd14_f06bcd6c74a0.slice. Jul 2 07:56:28.118730 kubelet[2596]: I0702 07:56:28.118615 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/877b4276-dbab-4395-bd14-f06bcd6c74a0-typha-certs\") pod \"calico-typha-58b89b86d6-l4vkl\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " pod="calico-system/calico-typha-58b89b86d6-l4vkl" Jul 2 07:56:28.119036 kubelet[2596]: I0702 07:56:28.119017 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9pg2k\" (UniqueName: \"kubernetes.io/projected/877b4276-dbab-4395-bd14-f06bcd6c74a0-kube-api-access-9pg2k\") pod \"calico-typha-58b89b86d6-l4vkl\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " pod="calico-system/calico-typha-58b89b86d6-l4vkl" Jul 2 07:56:28.119188 kubelet[2596]: I0702 07:56:28.119173 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/877b4276-dbab-4395-bd14-f06bcd6c74a0-tigera-ca-bundle\") pod \"calico-typha-58b89b86d6-l4vkl\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " pod="calico-system/calico-typha-58b89b86d6-l4vkl" Jul 2 07:56:28.195741 kubelet[2596]: I0702 07:56:28.195705 2596 topology_manager.go:215] "Topology Admit Handler" podUID="adef189f-99c8-4d02-a330-0bc8026e9b10" podNamespace="calico-system" podName="calico-node-kccvd" Jul 2 07:56:28.202546 systemd[1]: Created slice kubepods-besteffort-podadef189f_99c8_4d02_a330_0bc8026e9b10.slice. Jul 2 07:56:28.220224 kubelet[2596]: I0702 07:56:28.219922 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/adef189f-99c8-4d02-a330-0bc8026e9b10-tigera-ca-bundle\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.221675 kubelet[2596]: I0702 07:56:28.220573 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-lib-modules\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.221943 kubelet[2596]: I0702 07:56:28.221924 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-net-dir\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222152 kubelet[2596]: I0702 07:56:28.222137 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-lib-calico\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222315 kubelet[2596]: I0702 07:56:28.222302 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9mtjp\" (UniqueName: \"kubernetes.io/projected/adef189f-99c8-4d02-a330-0bc8026e9b10-kube-api-access-9mtjp\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222479 kubelet[2596]: I0702 07:56:28.222466 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-xtables-lock\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222650 kubelet[2596]: I0702 07:56:28.222636 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-policysync\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222848 kubelet[2596]: I0702 07:56:28.222835 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-bin-dir\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.222980 kubelet[2596]: I0702 07:56:28.222971 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/adef189f-99c8-4d02-a330-0bc8026e9b10-node-certs\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.223119 kubelet[2596]: I0702 07:56:28.223110 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-run-calico\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.223258 kubelet[2596]: I0702 07:56:28.223246 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-log-dir\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.223438 kubelet[2596]: I0702 07:56:28.223417 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-flexvol-driver-host\") pod \"calico-node-kccvd\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " pod="calico-system/calico-node-kccvd" Jul 2 07:56:28.319372 kubelet[2596]: I0702 07:56:28.319319 2596 topology_manager.go:215] "Topology Admit Handler" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" podNamespace="calico-system" podName="csi-node-driver-h8rtq" Jul 2 07:56:28.319737 kubelet[2596]: E0702 07:56:28.319708 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:28.327409 kubelet[2596]: E0702 07:56:28.327375 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.327409 kubelet[2596]: W0702 07:56:28.327403 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.327669 kubelet[2596]: E0702 07:56:28.327431 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.327669 kubelet[2596]: E0702 07:56:28.327631 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.327669 kubelet[2596]: W0702 07:56:28.327642 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.327669 kubelet[2596]: E0702 07:56:28.327659 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.327906 kubelet[2596]: E0702 07:56:28.327842 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.327906 kubelet[2596]: W0702 07:56:28.327852 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.327906 kubelet[2596]: E0702 07:56:28.327866 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.328091 kubelet[2596]: E0702 07:56:28.328075 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.328183 kubelet[2596]: W0702 07:56:28.328092 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.328183 kubelet[2596]: E0702 07:56:28.328107 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.328370 kubelet[2596]: E0702 07:56:28.328351 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.328370 kubelet[2596]: W0702 07:56:28.328368 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.328515 kubelet[2596]: E0702 07:56:28.328391 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.328613 kubelet[2596]: E0702 07:56:28.328597 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.328781 kubelet[2596]: W0702 07:56:28.328614 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.328869 kubelet[2596]: E0702 07:56:28.328808 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.328961 kubelet[2596]: E0702 07:56:28.328944 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.329029 kubelet[2596]: W0702 07:56:28.328964 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.329091 kubelet[2596]: E0702 07:56:28.329056 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.332965 kubelet[2596]: E0702 07:56:28.332943 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.333069 kubelet[2596]: W0702 07:56:28.332967 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.333135 kubelet[2596]: E0702 07:56:28.333080 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.333231 kubelet[2596]: E0702 07:56:28.333215 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.333303 kubelet[2596]: W0702 07:56:28.333232 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.333370 kubelet[2596]: E0702 07:56:28.333329 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.333478 kubelet[2596]: E0702 07:56:28.333462 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.333553 kubelet[2596]: W0702 07:56:28.333479 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.333601 kubelet[2596]: E0702 07:56:28.333570 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.333726 kubelet[2596]: E0702 07:56:28.333709 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.333809 kubelet[2596]: W0702 07:56:28.333726 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.333869 kubelet[2596]: E0702 07:56:28.333826 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.334029 kubelet[2596]: E0702 07:56:28.334013 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.334029 kubelet[2596]: W0702 07:56:28.334029 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.334165 kubelet[2596]: E0702 07:56:28.334116 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.334249 kubelet[2596]: E0702 07:56:28.334234 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.334318 kubelet[2596]: W0702 07:56:28.334249 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.334318 kubelet[2596]: E0702 07:56:28.334269 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.334478 kubelet[2596]: E0702 07:56:28.334460 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.334551 kubelet[2596]: W0702 07:56:28.334481 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.334597 kubelet[2596]: E0702 07:56:28.334567 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.334706 kubelet[2596]: E0702 07:56:28.334693 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.334971 kubelet[2596]: W0702 07:56:28.334707 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.339519 kubelet[2596]: E0702 07:56:28.338063 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.339519 kubelet[2596]: E0702 07:56:28.338511 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.339519 kubelet[2596]: W0702 07:56:28.338529 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.339519 kubelet[2596]: E0702 07:56:28.338561 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.339519 kubelet[2596]: E0702 07:56:28.338947 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.339519 kubelet[2596]: W0702 07:56:28.338964 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.339519 kubelet[2596]: E0702 07:56:28.338991 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.341769 kubelet[2596]: E0702 07:56:28.341746 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.341969 kubelet[2596]: W0702 07:56:28.341950 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.342231 kubelet[2596]: E0702 07:56:28.342215 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.342481 kubelet[2596]: E0702 07:56:28.342470 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.342576 kubelet[2596]: W0702 07:56:28.342564 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.342739 kubelet[2596]: E0702 07:56:28.342728 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.342966 kubelet[2596]: E0702 07:56:28.342953 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.343052 kubelet[2596]: W0702 07:56:28.343040 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.343138 kubelet[2596]: E0702 07:56:28.343129 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.343426 kubelet[2596]: E0702 07:56:28.343413 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.343518 kubelet[2596]: W0702 07:56:28.343507 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.343596 kubelet[2596]: E0702 07:56:28.343588 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.349870 kubelet[2596]: E0702 07:56:28.349261 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.349870 kubelet[2596]: W0702 07:56:28.349306 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.349870 kubelet[2596]: E0702 07:56:28.349331 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.372629 kubelet[2596]: E0702 07:56:28.372520 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.372865 kubelet[2596]: W0702 07:56:28.372843 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.373026 kubelet[2596]: E0702 07:56:28.373014 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.413403 env[1438]: time="2024-07-02T07:56:28.412868874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58b89b86d6-l4vkl,Uid:877b4276-dbab-4395-bd14-f06bcd6c74a0,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:28.414084 kubelet[2596]: E0702 07:56:28.414060 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.414294 kubelet[2596]: W0702 07:56:28.414248 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.414448 kubelet[2596]: E0702 07:56:28.414434 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.414897 kubelet[2596]: E0702 07:56:28.414882 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.415055 kubelet[2596]: W0702 07:56:28.415040 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.415173 kubelet[2596]: E0702 07:56:28.415161 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.415541 kubelet[2596]: E0702 07:56:28.415527 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.415658 kubelet[2596]: W0702 07:56:28.415645 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.415758 kubelet[2596]: E0702 07:56:28.415749 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.416115 kubelet[2596]: E0702 07:56:28.416102 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.416241 kubelet[2596]: W0702 07:56:28.416229 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.416335 kubelet[2596]: E0702 07:56:28.416326 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.416735 kubelet[2596]: E0702 07:56:28.416723 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.416868 kubelet[2596]: W0702 07:56:28.416856 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.416986 kubelet[2596]: E0702 07:56:28.416975 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.417397 kubelet[2596]: E0702 07:56:28.417384 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.417529 kubelet[2596]: W0702 07:56:28.417516 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.417630 kubelet[2596]: E0702 07:56:28.417619 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.418031 kubelet[2596]: E0702 07:56:28.418017 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.418143 kubelet[2596]: W0702 07:56:28.418129 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.418257 kubelet[2596]: E0702 07:56:28.418242 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.418586 kubelet[2596]: E0702 07:56:28.418573 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.418716 kubelet[2596]: W0702 07:56:28.418702 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.418865 kubelet[2596]: E0702 07:56:28.418845 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.419438 kubelet[2596]: E0702 07:56:28.419425 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.419548 kubelet[2596]: W0702 07:56:28.419536 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.419710 kubelet[2596]: E0702 07:56:28.419698 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.420055 kubelet[2596]: E0702 07:56:28.420041 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.420174 kubelet[2596]: W0702 07:56:28.420160 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.420278 kubelet[2596]: E0702 07:56:28.420267 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.420861 kubelet[2596]: E0702 07:56:28.420847 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.420981 kubelet[2596]: W0702 07:56:28.420959 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.421074 kubelet[2596]: E0702 07:56:28.421063 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.421447 kubelet[2596]: E0702 07:56:28.421434 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.421554 kubelet[2596]: W0702 07:56:28.421540 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.421667 kubelet[2596]: E0702 07:56:28.421642 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.422024 kubelet[2596]: E0702 07:56:28.422011 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.422245 kubelet[2596]: W0702 07:56:28.422227 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.422376 kubelet[2596]: E0702 07:56:28.422364 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.422693 kubelet[2596]: E0702 07:56:28.422681 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.422884 kubelet[2596]: W0702 07:56:28.422870 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.422999 kubelet[2596]: E0702 07:56:28.422989 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.424269 kubelet[2596]: E0702 07:56:28.424256 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.424373 kubelet[2596]: W0702 07:56:28.424360 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.424452 kubelet[2596]: E0702 07:56:28.424443 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.426462 kubelet[2596]: E0702 07:56:28.426448 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.426573 kubelet[2596]: W0702 07:56:28.426560 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.426658 kubelet[2596]: E0702 07:56:28.426650 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.427172 kubelet[2596]: E0702 07:56:28.427158 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.427281 kubelet[2596]: W0702 07:56:28.427268 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.427362 kubelet[2596]: E0702 07:56:28.427353 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.427608 kubelet[2596]: E0702 07:56:28.427598 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.427697 kubelet[2596]: W0702 07:56:28.427687 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.427768 kubelet[2596]: E0702 07:56:28.427760 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.428058 kubelet[2596]: E0702 07:56:28.428046 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.428159 kubelet[2596]: W0702 07:56:28.428147 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.428250 kubelet[2596]: E0702 07:56:28.428232 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.428513 kubelet[2596]: E0702 07:56:28.428500 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.428610 kubelet[2596]: W0702 07:56:28.428599 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.428685 kubelet[2596]: E0702 07:56:28.428676 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.429130 kubelet[2596]: E0702 07:56:28.429116 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.429240 kubelet[2596]: W0702 07:56:28.429227 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.429335 kubelet[2596]: E0702 07:56:28.429325 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.429447 kubelet[2596]: I0702 07:56:28.429434 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bc2d8944-2264-43ed-9cd6-a64fde16f9a3-varrun\") pod \"csi-node-driver-h8rtq\" (UID: \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\") " pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:28.429906 kubelet[2596]: E0702 07:56:28.429893 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.430041 kubelet[2596]: W0702 07:56:28.430026 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.430151 kubelet[2596]: E0702 07:56:28.430140 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.430436 kubelet[2596]: E0702 07:56:28.430423 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.430542 kubelet[2596]: W0702 07:56:28.430530 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.430646 kubelet[2596]: E0702 07:56:28.430635 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.430906 kubelet[2596]: I0702 07:56:28.430893 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bc2d8944-2264-43ed-9cd6-a64fde16f9a3-kubelet-dir\") pod \"csi-node-driver-h8rtq\" (UID: \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\") " pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:28.431133 kubelet[2596]: E0702 07:56:28.431121 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.431229 kubelet[2596]: W0702 07:56:28.431216 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.431310 kubelet[2596]: E0702 07:56:28.431299 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.431673 kubelet[2596]: E0702 07:56:28.431659 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.431782 kubelet[2596]: W0702 07:56:28.431770 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.431889 kubelet[2596]: E0702 07:56:28.431878 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.432169 kubelet[2596]: E0702 07:56:28.432155 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.432270 kubelet[2596]: W0702 07:56:28.432257 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.432357 kubelet[2596]: E0702 07:56:28.432346 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.432536 kubelet[2596]: I0702 07:56:28.432524 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bc2d8944-2264-43ed-9cd6-a64fde16f9a3-registration-dir\") pod \"csi-node-driver-h8rtq\" (UID: \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\") " pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:28.432744 kubelet[2596]: E0702 07:56:28.432733 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.432855 kubelet[2596]: W0702 07:56:28.432842 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.432934 kubelet[2596]: E0702 07:56:28.432924 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.433275 kubelet[2596]: E0702 07:56:28.433262 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.433377 kubelet[2596]: W0702 07:56:28.433364 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.433461 kubelet[2596]: E0702 07:56:28.433452 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.433724 kubelet[2596]: E0702 07:56:28.433712 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.433872 kubelet[2596]: W0702 07:56:28.433859 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.433965 kubelet[2596]: E0702 07:56:28.433955 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.434137 kubelet[2596]: I0702 07:56:28.434128 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gztdd\" (UniqueName: \"kubernetes.io/projected/bc2d8944-2264-43ed-9cd6-a64fde16f9a3-kube-api-access-gztdd\") pod \"csi-node-driver-h8rtq\" (UID: \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\") " pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:28.434340 kubelet[2596]: E0702 07:56:28.434330 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.434431 kubelet[2596]: W0702 07:56:28.434420 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.434507 kubelet[2596]: E0702 07:56:28.434497 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.434853 kubelet[2596]: E0702 07:56:28.434840 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.434957 kubelet[2596]: W0702 07:56:28.434944 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.435034 kubelet[2596]: E0702 07:56:28.435026 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.435303 kubelet[2596]: E0702 07:56:28.435289 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.435411 kubelet[2596]: W0702 07:56:28.435397 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.435496 kubelet[2596]: E0702 07:56:28.435487 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.435721 kubelet[2596]: I0702 07:56:28.435708 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bc2d8944-2264-43ed-9cd6-a64fde16f9a3-socket-dir\") pod \"csi-node-driver-h8rtq\" (UID: \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\") " pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:28.435975 kubelet[2596]: E0702 07:56:28.435949 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.436101 kubelet[2596]: W0702 07:56:28.436087 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.436229 kubelet[2596]: E0702 07:56:28.436213 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.436669 kubelet[2596]: E0702 07:56:28.436654 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.436762 kubelet[2596]: W0702 07:56:28.436750 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.436892 kubelet[2596]: E0702 07:56:28.436880 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.437196 kubelet[2596]: E0702 07:56:28.437182 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.437289 kubelet[2596]: W0702 07:56:28.437276 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.437379 kubelet[2596]: E0702 07:56:28.437369 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.506143 env[1438]: time="2024-07-02T07:56:28.506085641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kccvd,Uid:adef189f-99c8-4d02-a330-0bc8026e9b10,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:28.537828 kubelet[2596]: E0702 07:56:28.537777 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.538058 kubelet[2596]: W0702 07:56:28.538042 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.538140 kubelet[2596]: E0702 07:56:28.538131 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.538481 kubelet[2596]: E0702 07:56:28.538464 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.538612 kubelet[2596]: W0702 07:56:28.538599 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.538694 kubelet[2596]: E0702 07:56:28.538686 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.538987 kubelet[2596]: E0702 07:56:28.538972 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.539075 kubelet[2596]: W0702 07:56:28.539066 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.539155 kubelet[2596]: E0702 07:56:28.539147 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.539394 kubelet[2596]: E0702 07:56:28.539381 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.539493 kubelet[2596]: W0702 07:56:28.539483 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.539569 kubelet[2596]: E0702 07:56:28.539561 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.539863 kubelet[2596]: E0702 07:56:28.539849 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.539963 kubelet[2596]: W0702 07:56:28.539952 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.540030 kubelet[2596]: E0702 07:56:28.540023 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.540315 kubelet[2596]: E0702 07:56:28.540304 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.540415 kubelet[2596]: W0702 07:56:28.540405 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.540482 kubelet[2596]: E0702 07:56:28.540475 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.540765 kubelet[2596]: E0702 07:56:28.540753 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.540893 kubelet[2596]: W0702 07:56:28.540881 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.540995 kubelet[2596]: E0702 07:56:28.540988 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.541242 kubelet[2596]: E0702 07:56:28.541231 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.541329 kubelet[2596]: W0702 07:56:28.541320 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.541398 kubelet[2596]: E0702 07:56:28.541390 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.541632 kubelet[2596]: E0702 07:56:28.541621 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.541718 kubelet[2596]: W0702 07:56:28.541709 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.541910 kubelet[2596]: E0702 07:56:28.541898 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.542189 kubelet[2596]: E0702 07:56:28.542044 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.542304 kubelet[2596]: W0702 07:56:28.542294 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.542465 kubelet[2596]: E0702 07:56:28.542450 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.542585 kubelet[2596]: E0702 07:56:28.542577 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.542659 kubelet[2596]: W0702 07:56:28.542649 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.542866 kubelet[2596]: E0702 07:56:28.542853 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.543007 kubelet[2596]: E0702 07:56:28.542998 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.543080 kubelet[2596]: W0702 07:56:28.543071 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.543244 kubelet[2596]: E0702 07:56:28.543229 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.543359 kubelet[2596]: E0702 07:56:28.543351 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.543425 kubelet[2596]: W0702 07:56:28.543417 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.543611 kubelet[2596]: E0702 07:56:28.543597 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.543729 kubelet[2596]: E0702 07:56:28.543722 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.543826 kubelet[2596]: W0702 07:56:28.543809 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.543997 kubelet[2596]: E0702 07:56:28.543984 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.544170 kubelet[2596]: E0702 07:56:28.544161 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.544242 kubelet[2596]: W0702 07:56:28.544233 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.544412 kubelet[2596]: E0702 07:56:28.544398 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.544522 kubelet[2596]: E0702 07:56:28.544515 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.544582 kubelet[2596]: W0702 07:56:28.544574 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.544737 kubelet[2596]: E0702 07:56:28.544723 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.544916 kubelet[2596]: E0702 07:56:28.544907 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.545001 kubelet[2596]: W0702 07:56:28.544991 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.545159 kubelet[2596]: E0702 07:56:28.545146 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.545276 kubelet[2596]: E0702 07:56:28.545268 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.545351 kubelet[2596]: W0702 07:56:28.545341 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.545510 kubelet[2596]: E0702 07:56:28.545497 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.545634 kubelet[2596]: E0702 07:56:28.545626 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.545696 kubelet[2596]: W0702 07:56:28.545688 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.545764 kubelet[2596]: E0702 07:56:28.545758 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.546032 kubelet[2596]: E0702 07:56:28.546020 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.546152 kubelet[2596]: W0702 07:56:28.546141 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.546238 kubelet[2596]: E0702 07:56:28.546230 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.546533 kubelet[2596]: E0702 07:56:28.546520 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.546617 kubelet[2596]: W0702 07:56:28.546606 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.546697 kubelet[2596]: E0702 07:56:28.546689 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.549096 kubelet[2596]: E0702 07:56:28.549079 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.549217 kubelet[2596]: W0702 07:56:28.549205 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.549333 kubelet[2596]: E0702 07:56:28.549325 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.549691 kubelet[2596]: E0702 07:56:28.549660 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.549966 kubelet[2596]: W0702 07:56:28.549925 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.550282 kubelet[2596]: E0702 07:56:28.550268 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.554474 kubelet[2596]: E0702 07:56:28.553767 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.554614 kubelet[2596]: W0702 07:56:28.554597 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.555107 kubelet[2596]: E0702 07:56:28.555086 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.555240 kubelet[2596]: W0702 07:56:28.555225 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.555346 kubelet[2596]: E0702 07:56:28.555336 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.555490 kubelet[2596]: E0702 07:56:28.555478 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.564531 kubelet[2596]: E0702 07:56:28.564507 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:56:28.564697 kubelet[2596]: W0702 07:56:28.564684 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:56:28.564780 kubelet[2596]: E0702 07:56:28.564772 2596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:56:28.610355 env[1438]: time="2024-07-02T07:56:28.610267409Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:28.610619 env[1438]: time="2024-07-02T07:56:28.610316410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:28.610619 env[1438]: time="2024-07-02T07:56:28.610330610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:28.610619 env[1438]: time="2024-07-02T07:56:28.610526112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f pid=3055 runtime=io.containerd.runc.v2 Jul 2 07:56:28.633507 env[1438]: time="2024-07-02T07:56:28.623168929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:28.629183 systemd[1]: Started cri-containerd-92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f.scope. Jul 2 07:56:28.634990 env[1438]: time="2024-07-02T07:56:28.634560335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:28.634990 env[1438]: time="2024-07-02T07:56:28.634610235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:28.636889 env[1438]: time="2024-07-02T07:56:28.634878338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4 pid=3077 runtime=io.containerd.runc.v2 Jul 2 07:56:28.653245 systemd[1]: Started cri-containerd-068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4.scope. Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.685000 audit: BPF prog-id=119 op=LOAD Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3077 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036386234366438656136356532313261643864363065366261333933 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3077 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036386234366438656136356532313261643864363065366261333933 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.687000 audit: BPF prog-id=120 op=LOAD Jul 2 07:56:28.687000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002ff090 items=0 ppid=3077 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036386234366438656136356532313261643864363065366261333933 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.688000 audit: BPF prog-id=121 op=LOAD Jul 2 07:56:28.688000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002ff0d8 items=0 ppid=3077 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036386234366438656136356532313261643864363065366261333933 Jul 2 07:56:28.689000 audit: BPF prog-id=121 op=UNLOAD Jul 2 07:56:28.689000 audit: BPF prog-id=120 op=UNLOAD Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.689000 audit: BPF prog-id=122 op=LOAD Jul 2 07:56:28.689000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002ff4e8 items=0 ppid=3077 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036386234366438656136356532313261643864363065366261333933 Jul 2 07:56:28.708089 env[1438]: time="2024-07-02T07:56:28.708036818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kccvd,Uid:adef189f-99c8-4d02-a330-0bc8026e9b10,Namespace:calico-system,Attempt:0,} returns sandbox id \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\"" Jul 2 07:56:28.710360 env[1438]: time="2024-07-02T07:56:28.710317739Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.721000 audit: BPF prog-id=123 op=LOAD Jul 2 07:56:28.722000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.722000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663666343866636537643662323533633365366233303639616661 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663666343866636537643662323533633365366233303639616661 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.723000 audit: BPF prog-id=124 op=LOAD Jul 2 07:56:28.723000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000402150 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663666343866636537643662323533633365366233303639616661 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.724000 audit: BPF prog-id=125 op=LOAD Jul 2 07:56:28.724000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000402198 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663666343866636537643662323533633365366233303639616661 Jul 2 07:56:28.725000 audit: BPF prog-id=125 op=UNLOAD Jul 2 07:56:28.725000 audit: BPF prog-id=124 op=UNLOAD Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:28.725000 audit: BPF prog-id=126 op=LOAD Jul 2 07:56:28.725000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0004025a8 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:28.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663666343866636537643662323533633365366233303639616661 Jul 2 07:56:28.771692 env[1438]: time="2024-07-02T07:56:28.771618509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58b89b86d6-l4vkl,Uid:877b4276-dbab-4395-bd14-f06bcd6c74a0,Namespace:calico-system,Attempt:0,} returns sandbox id \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\"" Jul 2 07:56:29.079000 audit[3128]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.079000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcbaf66890 a2=0 a3=7ffcbaf6687c items=0 ppid=2730 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:29.080000 audit[3128]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:29.080000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcbaf66890 a2=0 a3=0 items=0 ppid=2730 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.090001 kubelet[2596]: E0702 07:56:30.089949 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:30.092000 audit[3131]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.092000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb9d4dd60 a2=0 a3=7ffdb9d4dd4c items=0 ppid=2730 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.094000 audit[3131]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.094000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb9d4dd60 a2=0 a3=0 items=0 ppid=2730 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.471620 env[1438]: time="2024-07-02T07:56:30.471560792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:30.479603 env[1438]: time="2024-07-02T07:56:30.479547865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:30.483986 env[1438]: time="2024-07-02T07:56:30.483941005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:30.490128 env[1438]: time="2024-07-02T07:56:30.490082060Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:30.490788 env[1438]: time="2024-07-02T07:56:30.490744466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:56:30.495515 env[1438]: time="2024-07-02T07:56:30.495471309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:56:30.497743 env[1438]: time="2024-07-02T07:56:30.497694529Z" level=info msg="CreateContainer within sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:56:30.566754 env[1438]: time="2024-07-02T07:56:30.566677355Z" level=info msg="CreateContainer within sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\"" Jul 2 07:56:30.567670 env[1438]: time="2024-07-02T07:56:30.567628464Z" level=info msg="StartContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\"" Jul 2 07:56:30.611420 systemd[1]: run-containerd-runc-k8s.io-44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f-runc.5FZnGU.mount: Deactivated successfully. Jul 2 07:56:30.622349 systemd[1]: Started cri-containerd-44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f.scope. Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f8c349c7be8 items=0 ppid=3077 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434653531356239353738343366666138643263303664316436623762 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.672000 audit: BPF prog-id=127 op=LOAD Jul 2 07:56:30.672000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002c9b88 items=0 ppid=3077 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434653531356239353738343366666138643263303664316436623762 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit: BPF prog-id=128 op=LOAD Jul 2 07:56:30.673000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002c9bd8 items=0 ppid=3077 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434653531356239353738343366666138643263303664316436623762 Jul 2 07:56:30.673000 audit: BPF prog-id=128 op=UNLOAD Jul 2 07:56:30.673000 audit: BPF prog-id=127 op=UNLOAD Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:30.673000 audit: BPF prog-id=129 op=LOAD Jul 2 07:56:30.673000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002c9c68 items=0 ppid=3077 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434653531356239353738343366666138643263303664316436623762 Jul 2 07:56:30.699617 env[1438]: time="2024-07-02T07:56:30.699554661Z" level=info msg="StartContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" returns successfully" Jul 2 07:56:30.720300 systemd[1]: cri-containerd-44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f.scope: Deactivated successfully. Jul 2 07:56:30.723000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:56:31.174214 env[1438]: time="2024-07-02T07:56:31.174164747Z" level=info msg="StopContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" with timeout 5 (s)" Jul 2 07:56:31.540832 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f-rootfs.mount: Deactivated successfully. Jul 2 07:56:32.089220 kubelet[2596]: E0702 07:56:32.089175 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:32.711741 env[1438]: time="2024-07-02T07:56:32.711633054Z" level=info msg="Stop container \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" with signal terminated" Jul 2 07:56:32.712782 env[1438]: time="2024-07-02T07:56:32.712252760Z" level=info msg="shim disconnected" id=44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f Jul 2 07:56:32.712973 env[1438]: time="2024-07-02T07:56:32.712787965Z" level=warning msg="cleaning up after shim disconnected" id=44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f namespace=k8s.io Jul 2 07:56:32.712973 env[1438]: time="2024-07-02T07:56:32.712823165Z" level=info msg="cleaning up dead shim" Jul 2 07:56:32.729502 env[1438]: time="2024-07-02T07:56:32.729322111Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3182 runtime=io.containerd.runc.v2\n" Jul 2 07:56:32.740737 env[1438]: time="2024-07-02T07:56:32.737453083Z" level=info msg="StopContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" returns successfully" Jul 2 07:56:32.740737 env[1438]: time="2024-07-02T07:56:32.738308691Z" level=info msg="StopPodSandbox for \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\"" Jul 2 07:56:32.740737 env[1438]: time="2024-07-02T07:56:32.738374891Z" level=info msg="Container to stop \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 2 07:56:32.743597 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4-shm.mount: Deactivated successfully. Jul 2 07:56:32.780486 systemd[1]: cri-containerd-068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4.scope: Deactivated successfully. Jul 2 07:56:32.779000 audit: BPF prog-id=119 op=UNLOAD Jul 2 07:56:32.783000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:56:32.810859 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4-rootfs.mount: Deactivated successfully. Jul 2 07:56:32.830670 env[1438]: time="2024-07-02T07:56:32.830607408Z" level=info msg="shim disconnected" id=068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4 Jul 2 07:56:32.831186 env[1438]: time="2024-07-02T07:56:32.831102313Z" level=warning msg="cleaning up after shim disconnected" id=068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4 namespace=k8s.io Jul 2 07:56:32.831186 env[1438]: time="2024-07-02T07:56:32.831182313Z" level=info msg="cleaning up dead shim" Jul 2 07:56:32.844603 env[1438]: time="2024-07-02T07:56:32.844541132Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3213 runtime=io.containerd.runc.v2\n" Jul 2 07:56:32.844984 env[1438]: time="2024-07-02T07:56:32.844950835Z" level=info msg="TearDown network for sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" successfully" Jul 2 07:56:32.844984 env[1438]: time="2024-07-02T07:56:32.844981736Z" level=info msg="StopPodSandbox for \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" returns successfully" Jul 2 07:56:32.873888 kubelet[2596]: I0702 07:56:32.873845 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9mtjp\" (UniqueName: \"kubernetes.io/projected/adef189f-99c8-4d02-a330-0bc8026e9b10-kube-api-access-9mtjp\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.873888 kubelet[2596]: I0702 07:56:32.873893 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-bin-dir\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.873920 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/adef189f-99c8-4d02-a330-0bc8026e9b10-node-certs\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.873944 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-log-dir\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.873970 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-xtables-lock\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.873997 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-flexvol-driver-host\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.874021 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-policysync\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874190 kubelet[2596]: I0702 07:56:32.874043 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-run-calico\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874450 kubelet[2596]: I0702 07:56:32.874068 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-net-dir\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874450 kubelet[2596]: I0702 07:56:32.874091 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-lib-modules\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874450 kubelet[2596]: I0702 07:56:32.874117 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-lib-calico\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874450 kubelet[2596]: I0702 07:56:32.874148 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/adef189f-99c8-4d02-a330-0bc8026e9b10-tigera-ca-bundle\") pod \"adef189f-99c8-4d02-a330-0bc8026e9b10\" (UID: \"adef189f-99c8-4d02-a330-0bc8026e9b10\") " Jul 2 07:56:32.874673 kubelet[2596]: I0702 07:56:32.874643 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/adef189f-99c8-4d02-a330-0bc8026e9b10-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 2 07:56:32.874746 kubelet[2596]: I0702 07:56:32.874713 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-policysync" (OuterVolumeSpecName: "policysync") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.874832 kubelet[2596]: I0702 07:56:32.874746 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.874832 kubelet[2596]: I0702 07:56:32.874773 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.874832 kubelet[2596]: I0702 07:56:32.874811 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.874981 kubelet[2596]: I0702 07:56:32.874851 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.875059 kubelet[2596]: I0702 07:56:32.874663 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.875186 kubelet[2596]: I0702 07:56:32.875172 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.875262 kubelet[2596]: I0702 07:56:32.875253 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.876681 kubelet[2596]: I0702 07:56:32.876651 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 07:56:32.882374 systemd[1]: var-lib-kubelet-pods-adef189f\x2d99c8\x2d4d02\x2da330\x2d0bc8026e9b10-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9mtjp.mount: Deactivated successfully. Jul 2 07:56:32.882509 systemd[1]: var-lib-kubelet-pods-adef189f\x2d99c8\x2d4d02\x2da330\x2d0bc8026e9b10-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Jul 2 07:56:32.884658 kubelet[2596]: I0702 07:56:32.884623 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/adef189f-99c8-4d02-a330-0bc8026e9b10-kube-api-access-9mtjp" (OuterVolumeSpecName: "kube-api-access-9mtjp") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "kube-api-access-9mtjp". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 2 07:56:32.887998 kubelet[2596]: I0702 07:56:32.887927 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/adef189f-99c8-4d02-a330-0bc8026e9b10-node-certs" (OuterVolumeSpecName: "node-certs") pod "adef189f-99c8-4d02-a330-0bc8026e9b10" (UID: "adef189f-99c8-4d02-a330-0bc8026e9b10"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975124 2596 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-flexvol-driver-host\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975177 2596 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-policysync\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975196 2596 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-run-calico\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975209 2596 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-net-dir\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975222 2596 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-lib-modules\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975235 2596 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-var-lib-calico\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975248 2596 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/adef189f-99c8-4d02-a330-0bc8026e9b10-tigera-ca-bundle\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.975264 kubelet[2596]: I0702 07:56:32.975262 2596 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-9mtjp\" (UniqueName: \"kubernetes.io/projected/adef189f-99c8-4d02-a330-0bc8026e9b10-kube-api-access-9mtjp\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.976005 kubelet[2596]: I0702 07:56:32.975275 2596 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-bin-dir\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.976005 kubelet[2596]: I0702 07:56:32.975288 2596 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/adef189f-99c8-4d02-a330-0bc8026e9b10-node-certs\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.976005 kubelet[2596]: I0702 07:56:32.975299 2596 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-cni-log-dir\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:32.976005 kubelet[2596]: I0702 07:56:32.975313 2596 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/adef189f-99c8-4d02-a330-0bc8026e9b10-xtables-lock\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:33.095593 systemd[1]: Removed slice kubepods-besteffort-podadef189f_99c8_4d02_a330_0bc8026e9b10.slice. Jul 2 07:56:33.181037 kubelet[2596]: I0702 07:56:33.181003 2596 scope.go:117] "RemoveContainer" containerID="44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f" Jul 2 07:56:33.187668 env[1438]: time="2024-07-02T07:56:33.186625744Z" level=info msg="RemoveContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\"" Jul 2 07:56:33.200614 env[1438]: time="2024-07-02T07:56:33.200411365Z" level=info msg="RemoveContainer for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" returns successfully" Jul 2 07:56:33.201076 kubelet[2596]: I0702 07:56:33.201046 2596 scope.go:117] "RemoveContainer" containerID="44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f" Jul 2 07:56:33.201659 env[1438]: time="2024-07-02T07:56:33.201521274Z" level=error msg="ContainerStatus for \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\": not found" Jul 2 07:56:33.201908 kubelet[2596]: E0702 07:56:33.201895 2596 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\": not found" containerID="44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f" Jul 2 07:56:33.202069 kubelet[2596]: I0702 07:56:33.202051 2596 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f"} err="failed to get container status \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\": rpc error: code = NotFound desc = an error occurred when try to find container \"44e515b957843ffa8d2c06d1d6b7ba4d50642ff1c15982b1a32100bc8206f46f\": not found" Jul 2 07:56:33.236338 kubelet[2596]: I0702 07:56:33.236195 2596 topology_manager.go:215] "Topology Admit Handler" podUID="a74a81f9-cb63-4bce-b1ae-393aaec30b3a" podNamespace="calico-system" podName="calico-node-rw6w9" Jul 2 07:56:33.236338 kubelet[2596]: E0702 07:56:33.236280 2596 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="adef189f-99c8-4d02-a330-0bc8026e9b10" containerName="flexvol-driver" Jul 2 07:56:33.236338 kubelet[2596]: I0702 07:56:33.236316 2596 memory_manager.go:346] "RemoveStaleState removing state" podUID="adef189f-99c8-4d02-a330-0bc8026e9b10" containerName="flexvol-driver" Jul 2 07:56:33.243892 systemd[1]: Created slice kubepods-besteffort-poda74a81f9_cb63_4bce_b1ae_393aaec30b3a.slice. Jul 2 07:56:33.280381 kubelet[2596]: I0702 07:56:33.280340 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-xtables-lock\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.280725 kubelet[2596]: I0702 07:56:33.280705 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-tigera-ca-bundle\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.286813 kubelet[2596]: I0702 07:56:33.280864 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-cni-log-dir\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.286813 kubelet[2596]: I0702 07:56:33.280930 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h272c\" (UniqueName: \"kubernetes.io/projected/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-kube-api-access-h272c\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.286813 kubelet[2596]: I0702 07:56:33.281010 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-policysync\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.286813 kubelet[2596]: I0702 07:56:33.281045 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-var-run-calico\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.286813 kubelet[2596]: I0702 07:56:33.281097 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-cni-net-dir\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.287091 kubelet[2596]: I0702 07:56:33.281145 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-flexvol-driver-host\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.287091 kubelet[2596]: I0702 07:56:33.281177 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-cni-bin-dir\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.287091 kubelet[2596]: I0702 07:56:33.281206 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-lib-modules\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.287091 kubelet[2596]: I0702 07:56:33.281249 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-node-certs\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.287091 kubelet[2596]: I0702 07:56:33.281279 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a74a81f9-cb63-4bce-b1ae-393aaec30b3a-var-lib-calico\") pod \"calico-node-rw6w9\" (UID: \"a74a81f9-cb63-4bce-b1ae-393aaec30b3a\") " pod="calico-system/calico-node-rw6w9" Jul 2 07:56:33.551960 env[1438]: time="2024-07-02T07:56:33.551219137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rw6w9,Uid:a74a81f9-cb63-4bce-b1ae-393aaec30b3a,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:33.592067 env[1438]: time="2024-07-02T07:56:33.591975094Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:33.592067 env[1438]: time="2024-07-02T07:56:33.592027894Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:33.592067 env[1438]: time="2024-07-02T07:56:33.592041595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:33.596714 env[1438]: time="2024-07-02T07:56:33.593253705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407 pid=3243 runtime=io.containerd.runc.v2 Jul 2 07:56:33.613669 systemd[1]: Started cri-containerd-deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407.scope. Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.636169 kernel: kauditd_printk_skb: 174 callbacks suppressed Jul 2 07:56:33.636337 kernel: audit: type=1400 audit(1719906993.630:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.694897 kernel: audit: type=1400 audit(1719906993.630:876): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.695058 kernel: audit: type=1400 audit(1719906993.630:877): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.724119 env[1438]: time="2024-07-02T07:56:33.723778148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rw6w9,Uid:a74a81f9-cb63-4bce-b1ae-393aaec30b3a,Namespace:calico-system,Attempt:0,} returns sandbox id \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\"" Jul 2 07:56:33.732403 kernel: audit: type=1400 audit(1719906993.630:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.732477 kernel: audit: type=1400 audit(1719906993.630:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.760703 env[1438]: time="2024-07-02T07:56:33.752392199Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.785845 kernel: audit: type=1400 audit(1719906993.630:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.810952 kernel: audit: type=1400 audit(1719906993.630:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.840909 kernel: audit: type=1400 audit(1719906993.630:882): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.872259 kernel: audit: type=1400 audit(1719906993.630:883): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.899904 kernel: audit: type=1400 audit(1719906993.648:884): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.912967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1025801993.mount: Deactivated successfully. Jul 2 07:56:33.648000 audit: BPF prog-id=130 op=LOAD Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3243 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:33.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465636130366465366431643838373334376639643830383139666466 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3243 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:33.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465636130366465366431643838373334376639643830383139666466 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit: BPF prog-id=131 op=LOAD Jul 2 07:56:33.649000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185e20 items=0 ppid=3243 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:33.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465636130366465366431643838373334376639643830383139666466 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit: BPF prog-id=132 op=LOAD Jul 2 07:56:33.649000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185e68 items=0 ppid=3243 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:33.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465636130366465366431643838373334376639643830383139666466 Jul 2 07:56:33.649000 audit: BPF prog-id=132 op=UNLOAD Jul 2 07:56:33.649000 audit: BPF prog-id=131 op=UNLOAD Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:33.649000 audit: BPF prog-id=133 op=LOAD Jul 2 07:56:33.649000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c4278 items=0 ppid=3243 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:33.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465636130366465366431643838373334376639643830383139666466 Jul 2 07:56:33.930102 env[1438]: time="2024-07-02T07:56:33.930030855Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09\"" Jul 2 07:56:33.931565 env[1438]: time="2024-07-02T07:56:33.931514668Z" level=info msg="StartContainer for \"834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09\"" Jul 2 07:56:34.019147 systemd[1]: Started cri-containerd-834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09.scope. Jul 2 07:56:34.093080 kubelet[2596]: E0702 07:56:34.089729 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f44b6e212f8 items=0 ppid=3243 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:34.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346237623030303436626539336437396464656535386133373163 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit: BPF prog-id=134 op=LOAD Jul 2 07:56:34.172000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024928 items=0 ppid=3243 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:34.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346237623030303436626539336437396464656535386133373163 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit: BPF prog-id=135 op=LOAD Jul 2 07:56:34.172000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024978 items=0 ppid=3243 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:34.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346237623030303436626539336437396464656535386133373163 Jul 2 07:56:34.172000 audit: BPF prog-id=135 op=UNLOAD Jul 2 07:56:34.172000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:34.172000 audit: BPF prog-id=136 op=LOAD Jul 2 07:56:34.172000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024a08 items=0 ppid=3243 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:34.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346237623030303436626539336437396464656535386133373163 Jul 2 07:56:34.244020 systemd[1]: cri-containerd-834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09.scope: Deactivated successfully. Jul 2 07:56:34.246000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:56:34.347475 env[1438]: time="2024-07-02T07:56:34.347349976Z" level=info msg="StartContainer for \"834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09\" returns successfully" Jul 2 07:56:34.755287 systemd[1]: run-containerd-runc-k8s.io-834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09-runc.gJC71U.mount: Deactivated successfully. Jul 2 07:56:34.755414 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09-rootfs.mount: Deactivated successfully. Jul 2 07:56:34.960652 env[1438]: time="2024-07-02T07:56:34.960585787Z" level=info msg="shim disconnected" id=834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09 Jul 2 07:56:34.960652 env[1438]: time="2024-07-02T07:56:34.960648788Z" level=warning msg="cleaning up after shim disconnected" id=834b7b00046be93d79ddee58a371c2a60426d4583a9bb2b259d27a041a4e8e09 namespace=k8s.io Jul 2 07:56:34.960652 env[1438]: time="2024-07-02T07:56:34.960660288Z" level=info msg="cleaning up dead shim" Jul 2 07:56:34.969964 env[1438]: time="2024-07-02T07:56:34.969903468Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3325 runtime=io.containerd.runc.v2\n" Jul 2 07:56:35.093268 kubelet[2596]: I0702 07:56:35.093159 2596 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="adef189f-99c8-4d02-a330-0bc8026e9b10" path="/var/lib/kubelet/pods/adef189f-99c8-4d02-a330-0bc8026e9b10/volumes" Jul 2 07:56:35.725965 env[1438]: time="2024-07-02T07:56:35.725906347Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:35.736075 env[1438]: time="2024-07-02T07:56:35.736015733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:35.739924 env[1438]: time="2024-07-02T07:56:35.739871966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:35.745752 env[1438]: time="2024-07-02T07:56:35.745703016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:35.746256 env[1438]: time="2024-07-02T07:56:35.746219321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:56:35.747163 env[1438]: time="2024-07-02T07:56:35.746912427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:56:35.769947 env[1438]: time="2024-07-02T07:56:35.769892724Z" level=info msg="CreateContainer within sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:56:35.817176 env[1438]: time="2024-07-02T07:56:35.817110028Z" level=info msg="CreateContainer within sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\"" Jul 2 07:56:35.819518 env[1438]: time="2024-07-02T07:56:35.818021736Z" level=info msg="StartContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\"" Jul 2 07:56:35.843462 systemd[1]: Started cri-containerd-fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3.scope. Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.865000 audit: BPF prog-id=137 op=LOAD Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3055 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:35.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383138613562333565653832343964303864303230623530653061 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3055 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:35.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383138613562333565653832343964303864303230623530653061 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.867000 audit: BPF prog-id=138 op=LOAD Jul 2 07:56:35.867000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002195a0 items=0 ppid=3055 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:35.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383138613562333565653832343964303864303230623530653061 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit: BPF prog-id=139 op=LOAD Jul 2 07:56:35.868000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002195e8 items=0 ppid=3055 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383138613562333565653832343964303864303230623530653061 Jul 2 07:56:35.868000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:56:35.868000 audit: BPF prog-id=138 op=UNLOAD Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:35.868000 audit: BPF prog-id=140 op=LOAD Jul 2 07:56:35.868000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002199f8 items=0 ppid=3055 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383138613562333565653832343964303864303230623530653061 Jul 2 07:56:35.912028 env[1438]: time="2024-07-02T07:56:35.911964041Z" level=info msg="StartContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" returns successfully" Jul 2 07:56:36.089284 kubelet[2596]: E0702 07:56:36.089144 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:36.201776 env[1438]: time="2024-07-02T07:56:36.201728204Z" level=info msg="StopContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" with timeout 300 (s)" Jul 2 07:56:36.202771 env[1438]: time="2024-07-02T07:56:36.202732713Z" level=info msg="Stop container \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" with signal terminated" Jul 2 07:56:36.217000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:56:36.218110 systemd[1]: cri-containerd-fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3.scope: Deactivated successfully. Jul 2 07:56:36.221000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:56:36.225805 kubelet[2596]: I0702 07:56:36.225270 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-58b89b86d6-l4vkl" podStartSLOduration=1.252042305 podCreationTimestamp="2024-07-02 07:56:28 +0000 UTC" firstStartedPulling="2024-07-02 07:56:28.773525227 +0000 UTC m=+17.821415646" lastFinishedPulling="2024-07-02 07:56:35.746677825 +0000 UTC m=+24.794568344" observedRunningTime="2024-07-02 07:56:36.224596698 +0000 UTC m=+25.272487117" watchObservedRunningTime="2024-07-02 07:56:36.225195003 +0000 UTC m=+25.273085422" Jul 2 07:56:36.246723 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3-rootfs.mount: Deactivated successfully. Jul 2 07:56:37.658711 env[1438]: time="2024-07-02T07:56:37.658646392Z" level=info msg="shim disconnected" id=fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3 Jul 2 07:56:37.658711 env[1438]: time="2024-07-02T07:56:37.658707093Z" level=warning msg="cleaning up after shim disconnected" id=fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3 namespace=k8s.io Jul 2 07:56:37.658711 env[1438]: time="2024-07-02T07:56:37.658720393Z" level=info msg="cleaning up dead shim" Jul 2 07:56:37.669096 env[1438]: time="2024-07-02T07:56:37.669038279Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3401 runtime=io.containerd.runc.v2\n" Jul 2 07:56:37.674073 env[1438]: time="2024-07-02T07:56:37.673455016Z" level=info msg="StopContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" returns successfully" Jul 2 07:56:37.674745 env[1438]: time="2024-07-02T07:56:37.674704027Z" level=info msg="StopPodSandbox for \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\"" Jul 2 07:56:37.679545 env[1438]: time="2024-07-02T07:56:37.674778627Z" level=info msg="Container to stop \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 2 07:56:37.677852 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f-shm.mount: Deactivated successfully. Jul 2 07:56:37.687819 systemd[1]: cri-containerd-92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f.scope: Deactivated successfully. Jul 2 07:56:37.687000 audit: BPF prog-id=123 op=UNLOAD Jul 2 07:56:37.691000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:56:37.713024 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f-rootfs.mount: Deactivated successfully. Jul 2 07:56:37.727154 env[1438]: time="2024-07-02T07:56:37.727085766Z" level=info msg="shim disconnected" id=92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f Jul 2 07:56:37.727898 env[1438]: time="2024-07-02T07:56:37.727861572Z" level=warning msg="cleaning up after shim disconnected" id=92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f namespace=k8s.io Jul 2 07:56:37.728102 env[1438]: time="2024-07-02T07:56:37.728079874Z" level=info msg="cleaning up dead shim" Jul 2 07:56:37.738427 env[1438]: time="2024-07-02T07:56:37.738364361Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3432 runtime=io.containerd.runc.v2\n" Jul 2 07:56:37.738781 env[1438]: time="2024-07-02T07:56:37.738746164Z" level=info msg="TearDown network for sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" successfully" Jul 2 07:56:37.738916 env[1438]: time="2024-07-02T07:56:37.738781164Z" level=info msg="StopPodSandbox for \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" returns successfully" Jul 2 07:56:37.769040 kubelet[2596]: I0702 07:56:37.768993 2596 topology_manager.go:215] "Topology Admit Handler" podUID="3f8e6d41-4d3c-4936-8179-5c67350da512" podNamespace="calico-system" podName="calico-typha-766947c659-8hgbb" Jul 2 07:56:37.769887 kubelet[2596]: E0702 07:56:37.769850 2596 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="877b4276-dbab-4395-bd14-f06bcd6c74a0" containerName="calico-typha" Jul 2 07:56:37.770040 kubelet[2596]: I0702 07:56:37.769919 2596 memory_manager.go:346] "RemoveStaleState removing state" podUID="877b4276-dbab-4395-bd14-f06bcd6c74a0" containerName="calico-typha" Jul 2 07:56:37.776535 systemd[1]: Created slice kubepods-besteffort-pod3f8e6d41_4d3c_4936_8179_5c67350da512.slice. Jul 2 07:56:37.782000 audit[3446]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.782000 audit[3446]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe21859020 a2=0 a3=7ffe2185900c items=0 ppid=2730 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.784000 audit[3446]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.784000 audit[3446]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe21859020 a2=0 a3=0 items=0 ppid=2730 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.801000 audit[3448]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.801000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdc53e41b0 a2=0 a3=7ffdc53e419c items=0 ppid=2730 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.802000 audit[3448]: NETFILTER_CFG table=nat:106 family=2 entries=12 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.802000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc53e41b0 a2=0 a3=0 items=0 ppid=2730 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.852022 kubelet[2596]: I0702 07:56:37.851962 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9pg2k\" (UniqueName: \"kubernetes.io/projected/877b4276-dbab-4395-bd14-f06bcd6c74a0-kube-api-access-9pg2k\") pod \"877b4276-dbab-4395-bd14-f06bcd6c74a0\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " Jul 2 07:56:37.852709 kubelet[2596]: I0702 07:56:37.852670 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/877b4276-dbab-4395-bd14-f06bcd6c74a0-typha-certs\") pod \"877b4276-dbab-4395-bd14-f06bcd6c74a0\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " Jul 2 07:56:37.854644 kubelet[2596]: I0702 07:56:37.852761 2596 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/877b4276-dbab-4395-bd14-f06bcd6c74a0-tigera-ca-bundle\") pod \"877b4276-dbab-4395-bd14-f06bcd6c74a0\" (UID: \"877b4276-dbab-4395-bd14-f06bcd6c74a0\") " Jul 2 07:56:37.854644 kubelet[2596]: I0702 07:56:37.852868 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3f8e6d41-4d3c-4936-8179-5c67350da512-typha-certs\") pod \"calico-typha-766947c659-8hgbb\" (UID: \"3f8e6d41-4d3c-4936-8179-5c67350da512\") " pod="calico-system/calico-typha-766947c659-8hgbb" Jul 2 07:56:37.854644 kubelet[2596]: I0702 07:56:37.852909 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nv8ht\" (UniqueName: \"kubernetes.io/projected/3f8e6d41-4d3c-4936-8179-5c67350da512-kube-api-access-nv8ht\") pod \"calico-typha-766947c659-8hgbb\" (UID: \"3f8e6d41-4d3c-4936-8179-5c67350da512\") " pod="calico-system/calico-typha-766947c659-8hgbb" Jul 2 07:56:37.854644 kubelet[2596]: I0702 07:56:37.852949 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f8e6d41-4d3c-4936-8179-5c67350da512-tigera-ca-bundle\") pod \"calico-typha-766947c659-8hgbb\" (UID: \"3f8e6d41-4d3c-4936-8179-5c67350da512\") " pod="calico-system/calico-typha-766947c659-8hgbb" Jul 2 07:56:37.862081 kubelet[2596]: I0702 07:56:37.862040 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/877b4276-dbab-4395-bd14-f06bcd6c74a0-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "877b4276-dbab-4395-bd14-f06bcd6c74a0" (UID: "877b4276-dbab-4395-bd14-f06bcd6c74a0"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 2 07:56:37.863967 systemd[1]: var-lib-kubelet-pods-877b4276\x2ddbab\x2d4395\x2dbd14\x2df06bcd6c74a0-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Jul 2 07:56:37.878430 systemd[1]: var-lib-kubelet-pods-877b4276\x2ddbab\x2d4395\x2dbd14\x2df06bcd6c74a0-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Jul 2 07:56:37.878571 systemd[1]: var-lib-kubelet-pods-877b4276\x2ddbab\x2d4395\x2dbd14\x2df06bcd6c74a0-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9pg2k.mount: Deactivated successfully. Jul 2 07:56:37.883922 kubelet[2596]: I0702 07:56:37.883880 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/877b4276-dbab-4395-bd14-f06bcd6c74a0-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "877b4276-dbab-4395-bd14-f06bcd6c74a0" (UID: "877b4276-dbab-4395-bd14-f06bcd6c74a0"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 2 07:56:37.885516 kubelet[2596]: I0702 07:56:37.885468 2596 operation_generator.go:888] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/877b4276-dbab-4395-bd14-f06bcd6c74a0-kube-api-access-9pg2k" (OuterVolumeSpecName: "kube-api-access-9pg2k") pod "877b4276-dbab-4395-bd14-f06bcd6c74a0" (UID: "877b4276-dbab-4395-bd14-f06bcd6c74a0"). InnerVolumeSpecName "kube-api-access-9pg2k". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 2 07:56:37.953756 kubelet[2596]: I0702 07:56:37.953719 2596 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/877b4276-dbab-4395-bd14-f06bcd6c74a0-typha-certs\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:37.953756 kubelet[2596]: I0702 07:56:37.953757 2596 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/877b4276-dbab-4395-bd14-f06bcd6c74a0-tigera-ca-bundle\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:37.953756 kubelet[2596]: I0702 07:56:37.953774 2596 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-9pg2k\" (UniqueName: \"kubernetes.io/projected/877b4276-dbab-4395-bd14-f06bcd6c74a0-kube-api-access-9pg2k\") on node \"ci-3510.3.5-a-195c2606d4\" DevicePath \"\"" Jul 2 07:56:38.081246 env[1438]: time="2024-07-02T07:56:38.081172328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-766947c659-8hgbb,Uid:3f8e6d41-4d3c-4936-8179-5c67350da512,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:38.091614 kubelet[2596]: E0702 07:56:38.089136 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:38.155003 env[1438]: time="2024-07-02T07:56:38.154895840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:38.155003 env[1438]: time="2024-07-02T07:56:38.154934640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:38.155003 env[1438]: time="2024-07-02T07:56:38.154949040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:38.155485 env[1438]: time="2024-07-02T07:56:38.155420544Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6290a6645662d278ab6f150bad09021118417c52f36a58ae7589956aadeb7138 pid=3461 runtime=io.containerd.runc.v2 Jul 2 07:56:38.181305 systemd[1]: Started cri-containerd-6290a6645662d278ab6f150bad09021118417c52f36a58ae7589956aadeb7138.scope. Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.196000 audit: BPF prog-id=141 op=LOAD Jul 2 07:56:38.197000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.197000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393061363634353636326432373861623666313530626164303930 Jul 2 07:56:38.197000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.197000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393061363634353636326432373861623666313530626164303930 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit: BPF prog-id=142 op=LOAD Jul 2 07:56:38.198000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000216520 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393061363634353636326432373861623666313530626164303930 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.198000 audit: BPF prog-id=143 op=LOAD Jul 2 07:56:38.198000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000216568 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393061363634353636326432373861623666313530626164303930 Jul 2 07:56:38.199000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:56:38.199000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.199000 audit: BPF prog-id=144 op=LOAD Jul 2 07:56:38.199000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000216978 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393061363634353636326432373861623666313530626164303930 Jul 2 07:56:38.208665 kubelet[2596]: I0702 07:56:38.208562 2596 scope.go:117] "RemoveContainer" containerID="fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3" Jul 2 07:56:38.220005 systemd[1]: Removed slice kubepods-besteffort-pod877b4276_dbab_4395_bd14_f06bcd6c74a0.slice. Jul 2 07:56:38.221652 env[1438]: time="2024-07-02T07:56:38.220076881Z" level=info msg="RemoveContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\"" Jul 2 07:56:38.239601 env[1438]: time="2024-07-02T07:56:38.239552443Z" level=info msg="RemoveContainer for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" returns successfully" Jul 2 07:56:38.239863 kubelet[2596]: I0702 07:56:38.239830 2596 scope.go:117] "RemoveContainer" containerID="fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3" Jul 2 07:56:38.240235 env[1438]: time="2024-07-02T07:56:38.240159248Z" level=error msg="ContainerStatus for \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\": not found" Jul 2 07:56:38.240404 kubelet[2596]: E0702 07:56:38.240383 2596 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\": not found" containerID="fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3" Jul 2 07:56:38.240498 kubelet[2596]: I0702 07:56:38.240431 2596 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3"} err="failed to get container status \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\": rpc error: code = NotFound desc = an error occurred when try to find container \"fe818a5b35ee8249d08d020b50e0add77c576df5e5e2684adc86f48f535161f3\": not found" Jul 2 07:56:38.248860 env[1438]: time="2024-07-02T07:56:38.248809419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-766947c659-8hgbb,Uid:3f8e6d41-4d3c-4936-8179-5c67350da512,Namespace:calico-system,Attempt:0,} returns sandbox id \"6290a6645662d278ab6f150bad09021118417c52f36a58ae7589956aadeb7138\"" Jul 2 07:56:38.258899 env[1438]: time="2024-07-02T07:56:38.258834503Z" level=info msg="CreateContainer within sandbox \"6290a6645662d278ab6f150bad09021118417c52f36a58ae7589956aadeb7138\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:56:38.312924 env[1438]: time="2024-07-02T07:56:38.312857351Z" level=info msg="CreateContainer within sandbox \"6290a6645662d278ab6f150bad09021118417c52f36a58ae7589956aadeb7138\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8781781769ae0ed8ae8ce3b28ba9dfc07f5c5436e258c68156027ca67fcc7313\"" Jul 2 07:56:38.315405 env[1438]: time="2024-07-02T07:56:38.313913060Z" level=info msg="StartContainer for \"8781781769ae0ed8ae8ce3b28ba9dfc07f5c5436e258c68156027ca67fcc7313\"" Jul 2 07:56:38.343354 systemd[1]: Started cri-containerd-8781781769ae0ed8ae8ce3b28ba9dfc07f5c5436e258c68156027ca67fcc7313.scope. Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.394000 audit: BPF prog-id=145 op=LOAD Jul 2 07:56:38.396000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.396000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3461 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383137383137363961653065643861653863653362323862613964 Jul 2 07:56:38.396000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.396000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3461 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383137383137363961653065643861653863653362323862613964 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.399000 audit: BPF prog-id=146 op=LOAD Jul 2 07:56:38.399000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8210 items=0 ppid=3461 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383137383137363961653065643861653863653362323862613964 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.401000 audit: BPF prog-id=147 op=LOAD Jul 2 07:56:38.401000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a8258 items=0 ppid=3461 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383137383137363961653065643861653863653362323862613964 Jul 2 07:56:38.403000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:56:38.403000 audit: BPF prog-id=146 op=UNLOAD Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:38.404000 audit: BPF prog-id=148 op=LOAD Jul 2 07:56:38.404000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8668 items=0 ppid=3461 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383137383137363961653065643861653863653362323862613964 Jul 2 07:56:38.481328 env[1438]: time="2024-07-02T07:56:38.481056447Z" level=info msg="StartContainer for \"8781781769ae0ed8ae8ce3b28ba9dfc07f5c5436e258c68156027ca67fcc7313\" returns successfully" Jul 2 07:56:39.093444 kubelet[2596]: I0702 07:56:39.093389 2596 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="877b4276-dbab-4395-bd14-f06bcd6c74a0" path="/var/lib/kubelet/pods/877b4276-dbab-4395-bd14-f06bcd6c74a0/volumes" Jul 2 07:56:39.229240 kubelet[2596]: I0702 07:56:39.229028 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-766947c659-8hgbb" podStartSLOduration=11.228978035 podCreationTimestamp="2024-07-02 07:56:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:39.228608132 +0000 UTC m=+28.276498551" watchObservedRunningTime="2024-07-02 07:56:39.228978035 +0000 UTC m=+28.276868554" Jul 2 07:56:40.089356 kubelet[2596]: E0702 07:56:40.089299 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:40.438713 kubelet[2596]: I0702 07:56:40.438664 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:40.471000 audit[3537]: NETFILTER_CFG table=filter:107 family=2 entries=15 op=nft_register_rule pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.478038 kernel: kauditd_printk_skb: 278 callbacks suppressed Jul 2 07:56:40.478370 kernel: audit: type=1325 audit(1719907000.471:962): table=filter:107 family=2 entries=15 op=nft_register_rule pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.471000 audit[3537]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff8523aaf0 a2=0 a3=7fff8523aadc items=0 ppid=2730 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.529470 kernel: audit: type=1300 audit(1719907000.471:962): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff8523aaf0 a2=0 a3=7fff8523aadc items=0 ppid=2730 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.476000 audit[3537]: NETFILTER_CFG table=nat:108 family=2 entries=19 op=nft_register_chain pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.560499 kernel: audit: type=1327 audit(1719907000.471:962): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.560665 kernel: audit: type=1325 audit(1719907000.476:963): table=nat:108 family=2 entries=19 op=nft_register_chain pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.560814 kernel: audit: type=1300 audit(1719907000.476:963): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff8523aaf0 a2=0 a3=7fff8523aadc items=0 ppid=2730 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.476000 audit[3537]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff8523aaf0 a2=0 a3=7fff8523aadc items=0 ppid=2730 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.610821 kernel: audit: type=1327 audit(1719907000.476:963): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:42.090172 kubelet[2596]: E0702 07:56:42.089618 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:42.804965 env[1438]: time="2024-07-02T07:56:42.804903186Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:42.812133 env[1438]: time="2024-07-02T07:56:42.812084943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:42.817938 env[1438]: time="2024-07-02T07:56:42.817887189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:42.823903 env[1438]: time="2024-07-02T07:56:42.823849337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:42.824558 env[1438]: time="2024-07-02T07:56:42.824521042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:56:42.827678 env[1438]: time="2024-07-02T07:56:42.827639667Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:56:42.860900 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1648565384.mount: Deactivated successfully. Jul 2 07:56:42.877514 env[1438]: time="2024-07-02T07:56:42.877454065Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098\"" Jul 2 07:56:42.879606 env[1438]: time="2024-07-02T07:56:42.878245171Z" level=info msg="StartContainer for \"bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098\"" Jul 2 07:56:42.919534 systemd[1]: Started cri-containerd-bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098.scope. Jul 2 07:56:42.935000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954864 kernel: audit: type=1400 audit(1719907002.935:964): avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.935000 audit[3547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa57051d328 items=0 ppid=3243 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.990078 kernel: audit: type=1300 audit(1719907002.935:964): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa57051d328 items=0 ppid=3243 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363135353665326130393863326533663630303665353236366238 Jul 2 07:56:43.018589 kernel: audit: type=1327 audit(1719907002.935:964): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363135353665326130393863326533663630303665353236366238 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.936000 audit: BPF prog-id=149 op=LOAD Jul 2 07:56:42.936000 audit[3547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000212f48 items=0 ppid=3243 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363135353665326130393863326533663630303665353236366238 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:43.052303 kernel: audit: type=1400 audit(1719907002.936:965): avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit: BPF prog-id=150 op=LOAD Jul 2 07:56:42.954000 audit[3547]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000212f98 items=0 ppid=3243 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363135353665326130393863326533663630303665353236366238 Jul 2 07:56:42.954000 audit: BPF prog-id=150 op=UNLOAD Jul 2 07:56:42.954000 audit: BPF prog-id=149 op=UNLOAD Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { perfmon } for pid=3547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit[3547]: AVC avc: denied { bpf } for pid=3547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:42.954000 audit: BPF prog-id=151 op=LOAD Jul 2 07:56:42.954000 audit[3547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000213028 items=0 ppid=3243 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363135353665326130393863326533663630303665353236366238 Jul 2 07:56:43.061477 env[1438]: time="2024-07-02T07:56:43.061213327Z" level=info msg="StartContainer for \"bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098\" returns successfully" Jul 2 07:56:44.089540 kubelet[2596]: E0702 07:56:44.089485 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:46.089752 kubelet[2596]: E0702 07:56:46.089591 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:46.348613 systemd[1]: cri-containerd-bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098.scope: Deactivated successfully. Jul 2 07:56:46.353000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:56:46.364253 kernel: kauditd_printk_skb: 39 callbacks suppressed Jul 2 07:56:46.364582 kernel: audit: type=1334 audit(1719907006.353:970): prog-id=151 op=UNLOAD Jul 2 07:56:46.398308 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098-rootfs.mount: Deactivated successfully. Jul 2 07:56:46.428678 kubelet[2596]: I0702 07:56:46.428639 2596 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 07:56:46.454859 kubelet[2596]: I0702 07:56:46.454779 2596 topology_manager.go:215] "Topology Admit Handler" podUID="b5297c82-2d64-4187-bb29-5c66a9920b0d" podNamespace="kube-system" podName="coredns-5dd5756b68-nr8cz" Jul 2 07:56:46.462173 systemd[1]: Created slice kubepods-burstable-podb5297c82_2d64_4187_bb29_5c66a9920b0d.slice. Jul 2 07:56:46.469333 kubelet[2596]: I0702 07:56:46.469301 2596 topology_manager.go:215] "Topology Admit Handler" podUID="b1ec8b9f-989e-4541-8073-8daeb79c5e76" podNamespace="kube-system" podName="coredns-5dd5756b68-ck8m8" Jul 2 07:56:46.469857 kubelet[2596]: I0702 07:56:46.469831 2596 topology_manager.go:215] "Topology Admit Handler" podUID="7b1b1833-060b-4dfd-a29b-39e0e87048c8" podNamespace="calico-system" podName="calico-kube-controllers-79ffdc4fbf-dl76k" Jul 2 07:56:46.477028 systemd[1]: Created slice kubepods-besteffort-pod7b1b1833_060b_4dfd_a29b_39e0e87048c8.slice. Jul 2 07:56:46.483515 systemd[1]: Created slice kubepods-burstable-podb1ec8b9f_989e_4541_8073_8daeb79c5e76.slice. Jul 2 07:56:46.620813 kubelet[2596]: I0702 07:56:46.620655 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b5297c82-2d64-4187-bb29-5c66a9920b0d-config-volume\") pod \"coredns-5dd5756b68-nr8cz\" (UID: \"b5297c82-2d64-4187-bb29-5c66a9920b0d\") " pod="kube-system/coredns-5dd5756b68-nr8cz" Jul 2 07:56:46.620813 kubelet[2596]: I0702 07:56:46.620710 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wnqqp\" (UniqueName: \"kubernetes.io/projected/b5297c82-2d64-4187-bb29-5c66a9920b0d-kube-api-access-wnqqp\") pod \"coredns-5dd5756b68-nr8cz\" (UID: \"b5297c82-2d64-4187-bb29-5c66a9920b0d\") " pod="kube-system/coredns-5dd5756b68-nr8cz" Jul 2 07:56:46.620813 kubelet[2596]: I0702 07:56:46.620742 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7b1b1833-060b-4dfd-a29b-39e0e87048c8-tigera-ca-bundle\") pod \"calico-kube-controllers-79ffdc4fbf-dl76k\" (UID: \"7b1b1833-060b-4dfd-a29b-39e0e87048c8\") " pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" Jul 2 07:56:46.620813 kubelet[2596]: I0702 07:56:46.620771 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b1ec8b9f-989e-4541-8073-8daeb79c5e76-config-volume\") pod \"coredns-5dd5756b68-ck8m8\" (UID: \"b1ec8b9f-989e-4541-8073-8daeb79c5e76\") " pod="kube-system/coredns-5dd5756b68-ck8m8" Jul 2 07:56:46.621216 kubelet[2596]: I0702 07:56:46.620827 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hz52z\" (UniqueName: \"kubernetes.io/projected/7b1b1833-060b-4dfd-a29b-39e0e87048c8-kube-api-access-hz52z\") pod \"calico-kube-controllers-79ffdc4fbf-dl76k\" (UID: \"7b1b1833-060b-4dfd-a29b-39e0e87048c8\") " pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" Jul 2 07:56:46.621216 kubelet[2596]: I0702 07:56:46.620862 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xw58s\" (UniqueName: \"kubernetes.io/projected/b1ec8b9f-989e-4541-8073-8daeb79c5e76-kube-api-access-xw58s\") pod \"coredns-5dd5756b68-ck8m8\" (UID: \"b1ec8b9f-989e-4541-8073-8daeb79c5e76\") " pod="kube-system/coredns-5dd5756b68-ck8m8" Jul 2 07:56:46.767927 env[1438]: time="2024-07-02T07:56:46.767873467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nr8cz,Uid:b5297c82-2d64-4187-bb29-5c66a9920b0d,Namespace:kube-system,Attempt:0,}" Jul 2 07:56:46.783045 env[1438]: time="2024-07-02T07:56:46.782976983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ffdc4fbf-dl76k,Uid:7b1b1833-060b-4dfd-a29b-39e0e87048c8,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:46.787998 env[1438]: time="2024-07-02T07:56:46.787940821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ck8m8,Uid:b1ec8b9f-989e-4541-8073-8daeb79c5e76,Namespace:kube-system,Attempt:0,}" Jul 2 07:56:48.097290 systemd[1]: Created slice kubepods-besteffort-podbc2d8944_2264_43ed_9cd6_a64fde16f9a3.slice. Jul 2 07:56:48.106190 env[1438]: time="2024-07-02T07:56:48.105390189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h8rtq,Uid:bc2d8944-2264-43ed-9cd6-a64fde16f9a3,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:50.551643 env[1438]: time="2024-07-02T07:56:50.551580987Z" level=info msg="shim disconnected" id=bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098 Jul 2 07:56:50.551643 env[1438]: time="2024-07-02T07:56:50.551636488Z" level=warning msg="cleaning up after shim disconnected" id=bf61556e2a098c2e3f6006e5266b8db9d524850f42eb2a829e050fa13e250098 namespace=k8s.io Jul 2 07:56:50.551643 env[1438]: time="2024-07-02T07:56:50.551648888Z" level=info msg="cleaning up dead shim" Jul 2 07:56:50.562515 env[1438]: time="2024-07-02T07:56:50.562440668Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3589 runtime=io.containerd.runc.v2\n" Jul 2 07:56:50.881998 env[1438]: time="2024-07-02T07:56:50.881784949Z" level=error msg="Failed to destroy network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.883464 env[1438]: time="2024-07-02T07:56:50.883403361Z" level=error msg="encountered an error cleaning up failed sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.883712 env[1438]: time="2024-07-02T07:56:50.883665363Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nr8cz,Uid:b5297c82-2d64-4187-bb29-5c66a9920b0d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.884158 kubelet[2596]: E0702 07:56:50.884127 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.884575 kubelet[2596]: E0702 07:56:50.884208 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nr8cz" Jul 2 07:56:50.884575 kubelet[2596]: E0702 07:56:50.884237 2596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nr8cz" Jul 2 07:56:50.886579 kubelet[2596]: E0702 07:56:50.886548 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-nr8cz_kube-system(b5297c82-2d64-4187-bb29-5c66a9920b0d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-nr8cz_kube-system(b5297c82-2d64-4187-bb29-5c66a9920b0d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nr8cz" podUID="b5297c82-2d64-4187-bb29-5c66a9920b0d" Jul 2 07:56:50.888926 env[1438]: time="2024-07-02T07:56:50.888877801Z" level=error msg="Failed to destroy network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.889447 env[1438]: time="2024-07-02T07:56:50.889403105Z" level=error msg="encountered an error cleaning up failed sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.889653 env[1438]: time="2024-07-02T07:56:50.889617907Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h8rtq,Uid:bc2d8944-2264-43ed-9cd6-a64fde16f9a3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.892274 kubelet[2596]: E0702 07:56:50.890064 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.892274 kubelet[2596]: E0702 07:56:50.890121 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:50.892274 kubelet[2596]: E0702 07:56:50.890165 2596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h8rtq" Jul 2 07:56:50.892456 kubelet[2596]: E0702 07:56:50.890252 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h8rtq_calico-system(bc2d8944-2264-43ed-9cd6-a64fde16f9a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h8rtq_calico-system(bc2d8944-2264-43ed-9cd6-a64fde16f9a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:50.893434 env[1438]: time="2024-07-02T07:56:50.893392335Z" level=error msg="Failed to destroy network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.894016 env[1438]: time="2024-07-02T07:56:50.893974039Z" level=error msg="encountered an error cleaning up failed sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.894208 env[1438]: time="2024-07-02T07:56:50.894162441Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ck8m8,Uid:b1ec8b9f-989e-4541-8073-8daeb79c5e76,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.896368 kubelet[2596]: E0702 07:56:50.896019 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.896368 kubelet[2596]: E0702 07:56:50.896089 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ck8m8" Jul 2 07:56:50.896368 kubelet[2596]: E0702 07:56:50.896111 2596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ck8m8" Jul 2 07:56:50.896555 kubelet[2596]: E0702 07:56:50.896170 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-ck8m8_kube-system(b1ec8b9f-989e-4541-8073-8daeb79c5e76)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-ck8m8_kube-system(b1ec8b9f-989e-4541-8073-8daeb79c5e76)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ck8m8" podUID="b1ec8b9f-989e-4541-8073-8daeb79c5e76" Jul 2 07:56:50.902327 env[1438]: time="2024-07-02T07:56:50.902272001Z" level=error msg="Failed to destroy network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.902679 env[1438]: time="2024-07-02T07:56:50.902633304Z" level=error msg="encountered an error cleaning up failed sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.902769 env[1438]: time="2024-07-02T07:56:50.902701504Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ffdc4fbf-dl76k,Uid:7b1b1833-060b-4dfd-a29b-39e0e87048c8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.902995 kubelet[2596]: E0702 07:56:50.902955 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:50.903092 kubelet[2596]: E0702 07:56:50.903015 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" Jul 2 07:56:50.903092 kubelet[2596]: E0702 07:56:50.903042 2596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" Jul 2 07:56:50.903194 kubelet[2596]: E0702 07:56:50.903107 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79ffdc4fbf-dl76k_calico-system(7b1b1833-060b-4dfd-a29b-39e0e87048c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79ffdc4fbf-dl76k_calico-system(7b1b1833-060b-4dfd-a29b-39e0e87048c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" podUID="7b1b1833-060b-4dfd-a29b-39e0e87048c8" Jul 2 07:56:51.247862 kubelet[2596]: I0702 07:56:51.247823 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:56:51.248924 env[1438]: time="2024-07-02T07:56:51.248872170Z" level=info msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" Jul 2 07:56:51.251434 kubelet[2596]: I0702 07:56:51.251400 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:56:51.252099 env[1438]: time="2024-07-02T07:56:51.252052894Z" level=info msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" Jul 2 07:56:51.255200 kubelet[2596]: I0702 07:56:51.255167 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:56:51.257232 env[1438]: time="2024-07-02T07:56:51.256102224Z" level=info msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" Jul 2 07:56:51.266870 env[1438]: time="2024-07-02T07:56:51.266813603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:56:51.269289 kubelet[2596]: I0702 07:56:51.267904 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:56:51.269507 env[1438]: time="2024-07-02T07:56:51.268494816Z" level=info msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" Jul 2 07:56:51.350931 env[1438]: time="2024-07-02T07:56:51.350849825Z" level=error msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" failed" error="failed to destroy network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:51.351535 kubelet[2596]: E0702 07:56:51.351495 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:56:51.351679 kubelet[2596]: E0702 07:56:51.351564 2596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638"} Jul 2 07:56:51.351679 kubelet[2596]: E0702 07:56:51.351623 2596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b5297c82-2d64-4187-bb29-5c66a9920b0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:51.351679 kubelet[2596]: E0702 07:56:51.351667 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b5297c82-2d64-4187-bb29-5c66a9920b0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nr8cz" podUID="b5297c82-2d64-4187-bb29-5c66a9920b0d" Jul 2 07:56:51.382533 env[1438]: time="2024-07-02T07:56:51.382015455Z" level=error msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" failed" error="failed to destroy network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:51.382772 kubelet[2596]: E0702 07:56:51.382437 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:56:51.382772 kubelet[2596]: E0702 07:56:51.382499 2596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b"} Jul 2 07:56:51.382772 kubelet[2596]: E0702 07:56:51.382548 2596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:51.382772 kubelet[2596]: E0702 07:56:51.382587 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bc2d8944-2264-43ed-9cd6-a64fde16f9a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h8rtq" podUID="bc2d8944-2264-43ed-9cd6-a64fde16f9a3" Jul 2 07:56:51.395106 env[1438]: time="2024-07-02T07:56:51.395028852Z" level=error msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" failed" error="failed to destroy network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:51.395940 kubelet[2596]: E0702 07:56:51.395685 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:56:51.395940 kubelet[2596]: E0702 07:56:51.395753 2596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e"} Jul 2 07:56:51.395940 kubelet[2596]: E0702 07:56:51.395824 2596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b1ec8b9f-989e-4541-8073-8daeb79c5e76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:51.395940 kubelet[2596]: E0702 07:56:51.395903 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b1ec8b9f-989e-4541-8073-8daeb79c5e76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ck8m8" podUID="b1ec8b9f-989e-4541-8073-8daeb79c5e76" Jul 2 07:56:51.408863 env[1438]: time="2024-07-02T07:56:51.408737253Z" level=error msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" failed" error="failed to destroy network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:51.409272 kubelet[2596]: E0702 07:56:51.409242 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:56:51.409402 kubelet[2596]: E0702 07:56:51.409298 2596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e"} Jul 2 07:56:51.409402 kubelet[2596]: E0702 07:56:51.409348 2596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7b1b1833-060b-4dfd-a29b-39e0e87048c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:51.409526 kubelet[2596]: E0702 07:56:51.409426 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7b1b1833-060b-4dfd-a29b-39e0e87048c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" podUID="7b1b1833-060b-4dfd-a29b-39e0e87048c8" Jul 2 07:56:51.651007 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e-shm.mount: Deactivated successfully. Jul 2 07:56:51.651999 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e-shm.mount: Deactivated successfully. Jul 2 07:56:51.652126 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638-shm.mount: Deactivated successfully. Jul 2 07:56:51.652205 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b-shm.mount: Deactivated successfully. Jul 2 07:56:59.605125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4250784125.mount: Deactivated successfully. Jul 2 07:56:59.667493 env[1438]: time="2024-07-02T07:56:59.667446822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:59.675396 env[1438]: time="2024-07-02T07:56:59.675330077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:59.679924 env[1438]: time="2024-07-02T07:56:59.679877709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:59.685186 env[1438]: time="2024-07-02T07:56:59.685133446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:59.685486 env[1438]: time="2024-07-02T07:56:59.685442548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:56:59.707238 env[1438]: time="2024-07-02T07:56:59.707189000Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:56:59.752456 env[1438]: time="2024-07-02T07:56:59.752407517Z" level=info msg="CreateContainer within sandbox \"deca06de6d1d887347f9d80819fdf8a9d4e03fdc7da2a4124921a8db719da407\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab\"" Jul 2 07:56:59.753706 env[1438]: time="2024-07-02T07:56:59.753662726Z" level=info msg="StartContainer for \"b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab\"" Jul 2 07:56:59.779774 systemd[1]: Started cri-containerd-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab.scope. Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.852257 kernel: audit: type=1400 audit(1719907019.813:971): avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.852440 kernel: audit: type=1300 audit(1719907019.813:971): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fce2c0c86c8 items=0 ppid=3243 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:59.813000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fce2c0c86c8 items=0 ppid=3243 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:59.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656236383337616335646164363737616661383262353032373834 Jul 2 07:56:59.889964 kernel: audit: type=1327 audit(1719907019.813:971): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656236383337616335646164363737616661383262353032373834 Jul 2 07:56:59.890301 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.890367 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.920940 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.938140 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.971615 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.971768 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.993832 kernel: audit: type=1400 audit(1719907019.813:972): avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.813000 audit: BPF prog-id=152 op=LOAD Jul 2 07:56:59.813000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000253b88 items=0 ppid=3243 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:59.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656236383337616335646164363737616661383262353032373834 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.814000 audit: BPF prog-id=153 op=LOAD Jul 2 07:56:59.814000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000253bd8 items=0 ppid=3243 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:59.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656236383337616335646164363737616661383262353032373834 Jul 2 07:56:59.871000 audit: BPF prog-id=153 op=UNLOAD Jul 2 07:56:59.874000 audit: BPF prog-id=152 op=UNLOAD Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:59.874000 audit: BPF prog-id=154 op=LOAD Jul 2 07:56:59.874000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000253c68 items=0 ppid=3243 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:59.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656236383337616335646164363737616661383262353032373834 Jul 2 07:57:00.006749 env[1438]: time="2024-07-02T07:57:00.006678596Z" level=info msg="StartContainer for \"b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab\" returns successfully" Jul 2 07:57:00.326468 kubelet[2596]: I0702 07:57:00.325702 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rw6w9" podStartSLOduration=2.848428482 podCreationTimestamp="2024-07-02 07:56:33 +0000 UTC" firstStartedPulling="2024-07-02 07:56:35.20910532 +0000 UTC m=+24.256995739" lastFinishedPulling="2024-07-02 07:56:59.686326054 +0000 UTC m=+48.734216473" observedRunningTime="2024-07-02 07:57:00.323590901 +0000 UTC m=+49.371481420" watchObservedRunningTime="2024-07-02 07:57:00.325649216 +0000 UTC m=+49.373539635" Jul 2 07:57:00.579459 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:57:00.579669 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:57:01.351145 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.nz3YV4.mount: Deactivated successfully. Jul 2 07:57:01.937000 audit[3958]: AVC avc: denied { write } for pid=3958 comm="tee" name="fd" dev="proc" ino=30645 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:01.937000 audit[3958]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffca0c3a0c a2=241 a3=1b6 items=1 ppid=3932 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:01.937000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:57:01.937000 audit: PATH item=0 name="/dev/fd/63" inode=30633 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:01.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:01.950000 audit[3962]: AVC avc: denied { write } for pid=3962 comm="tee" name="fd" dev="proc" ino=30652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:01.950000 audit[3962]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2e3829fc a2=241 a3=1b6 items=1 ppid=3935 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:01.950000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:57:01.950000 audit: PATH item=0 name="/dev/fd/63" inode=30640 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:01.950000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:01.990000 audit[3970]: AVC avc: denied { write } for pid=3970 comm="tee" name="fd" dev="proc" ino=30672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:01.990000 audit[3970]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb37d3a0c a2=241 a3=1b6 items=1 ppid=3937 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:01.990000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:57:01.990000 audit: PATH item=0 name="/dev/fd/63" inode=30649 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:01.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:01.997000 audit[3978]: AVC avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=30681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:01.997000 audit[3978]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe309b39fd a2=241 a3=1b6 items=1 ppid=3928 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:01.997000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:57:01.997000 audit: PATH item=0 name="/dev/fd/63" inode=30660 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:01.997000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:02.009000 audit[4002]: AVC avc: denied { write } for pid=4002 comm="tee" name="fd" dev="proc" ino=30686 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:02.009000 audit[4002]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb41a6a0d a2=241 a3=1b6 items=1 ppid=3930 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.009000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:57:02.009000 audit: PATH item=0 name="/dev/fd/63" inode=30676 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:02.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:02.017000 audit[3993]: AVC avc: denied { write } for pid=3993 comm="tee" name="fd" dev="proc" ino=30690 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:02.017000 audit[3993]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0c30ea0c a2=241 a3=1b6 items=1 ppid=3941 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.017000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:57:02.017000 audit: PATH item=0 name="/dev/fd/63" inode=30667 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:02.017000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:02.038000 audit[4005]: AVC avc: denied { write } for pid=4005 comm="tee" name="fd" dev="proc" ino=30694 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:02.038000 audit[4005]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca4d65a0e a2=241 a3=1b6 items=1 ppid=3943 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.038000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:57:02.038000 audit: PATH item=0 name="/dev/fd/63" inode=30683 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:02.038000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:02.421000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:02.423000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:02.423000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020d0e10 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:02.423000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:02.421000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00240fa40 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:02.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.503000 audit: BPF prog-id=155 op=LOAD Jul 2 07:57:02.503000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3101db60 a2=70 a3=7ff72a69c000 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.506000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.507000 audit: BPF prog-id=156 op=LOAD Jul 2 07:57:02.507000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3101db60 a2=70 a3=6f items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.508000 audit: BPF prog-id=156 op=UNLOAD Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd3101db10 a2=70 a3=7ffd3101db60 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.508000 audit: BPF prog-id=157 op=LOAD Jul 2 07:57:02.508000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd3101daf0 a2=70 a3=7ffd3101db60 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.514000 audit: BPF prog-id=157 op=UNLOAD Jul 2 07:57:02.514000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.514000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3101dbd0 a2=70 a3=0 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.514000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.514000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3101dbc0 a2=70 a3=0 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.514000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.514000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3101db30 a2=70 a3=0 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.515000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.528652 systemd-networkd[1587]: vxlan.calico: Link UP Jul 2 07:57:02.528663 systemd-networkd[1587]: vxlan.calico: Gained carrier Jul 2 07:57:02.515000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd3101dc00 a2=70 a3=72ba00 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.515000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.541000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.541000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd3101dc00 a2=70 a3=728880 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.542000 audit: BPF prog-id=158 op=LOAD Jul 2 07:57:02.542000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd3101db20 a2=70 a3=0 items=0 ppid=3938 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.542000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:02.552000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.552000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde13b7b30 a2=70 a3=fff80800 items=0 ppid=3938 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.552000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:57:02.554000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.554000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde13b7a00 a2=70 a3=3 items=0 ppid=3938 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:57:02.564000 audit: BPF prog-id=158 op=UNLOAD Jul 2 07:57:02.740000 audit[4099]: NETFILTER_CFG table=raw:109 family=2 entries=19 op=nft_register_chain pid=4099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:02.740000 audit[4099]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fff22e21a20 a2=0 a3=7fff22e21a0c items=0 ppid=3938 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.740000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:02.741000 audit[4102]: NETFILTER_CFG table=mangle:110 family=2 entries=16 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:02.741000 audit[4102]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee796d020 a2=0 a3=7ffee796d00c items=0 ppid=3938 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.741000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:02.760000 audit[4100]: NETFILTER_CFG table=nat:111 family=2 entries=15 op=nft_register_chain pid=4100 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:02.760000 audit[4100]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffea2242200 a2=0 a3=7ffea22421ec items=0 ppid=3938 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:02.770000 audit[4103]: NETFILTER_CFG table=filter:112 family=2 entries=39 op=nft_register_chain pid=4103 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:02.770000 audit[4103]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcc9a3c360 a2=0 a3=7ffcc9a3c34c items=0 ppid=3938 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.770000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:03.012000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.012000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00debbe00 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.025000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.025000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ae084e0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.029000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6374 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.029000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.029000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ae085a0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.029000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.030000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.030000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ae08810 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.029000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0055b1980 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.029000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.055000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:03.055000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0055b19a0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:57:03.055000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:57:03.785974 systemd-networkd[1587]: vxlan.calico: Gained IPv6LL Jul 2 07:57:04.091895 env[1438]: time="2024-07-02T07:57:04.089865947Z" level=info msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.147 [INFO][4126] k8s.go 608: Cleaning up netns ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.147 [INFO][4126] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" iface="eth0" netns="/var/run/netns/cni-23be04d2-459d-6619-20ad-306e7af89f0a" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.147 [INFO][4126] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" iface="eth0" netns="/var/run/netns/cni-23be04d2-459d-6619-20ad-306e7af89f0a" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.148 [INFO][4126] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" iface="eth0" netns="/var/run/netns/cni-23be04d2-459d-6619-20ad-306e7af89f0a" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.148 [INFO][4126] k8s.go 615: Releasing IP address(es) ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.148 [INFO][4126] utils.go 188: Calico CNI releasing IP address ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.170 [INFO][4132] ipam_plugin.go 411: Releasing address using handleID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.171 [INFO][4132] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.171 [INFO][4132] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.183 [WARNING][4132] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.184 [INFO][4132] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.189 [INFO][4132] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:04.191914 env[1438]: 2024-07-02 07:57:04.190 [INFO][4126] k8s.go 621: Teardown processing complete. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:04.196633 env[1438]: time="2024-07-02T07:57:04.192089442Z" level=info msg="TearDown network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" successfully" Jul 2 07:57:04.196633 env[1438]: time="2024-07-02T07:57:04.192142143Z" level=info msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" returns successfully" Jul 2 07:57:04.195351 systemd[1]: run-netns-cni\x2d23be04d2\x2d459d\x2d6619\x2d20ad\x2d306e7af89f0a.mount: Deactivated successfully. Jul 2 07:57:04.197512 env[1438]: time="2024-07-02T07:57:04.197467979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ck8m8,Uid:b1ec8b9f-989e-4541-8073-8daeb79c5e76,Namespace:kube-system,Attempt:1,}" Jul 2 07:57:04.414081 systemd-networkd[1587]: cali84d5261de71: Link UP Jul 2 07:57:04.433338 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:04.433512 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali84d5261de71: link becomes ready Jul 2 07:57:04.436285 systemd-networkd[1587]: cali84d5261de71: Gained carrier Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.290 [INFO][4138] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0 coredns-5dd5756b68- kube-system b1ec8b9f-989e-4541-8073-8daeb79c5e76 823 0 2024-07-02 07:56:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 coredns-5dd5756b68-ck8m8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali84d5261de71 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.298 [INFO][4138] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.349 [INFO][4150] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" HandleID="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.362 [INFO][4150] ipam_plugin.go 264: Auto assigning IP ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" HandleID="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f3970), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-195c2606d4", "pod":"coredns-5dd5756b68-ck8m8", "timestamp":"2024-07-02 07:57:04.349706114 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.362 [INFO][4150] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.362 [INFO][4150] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.362 [INFO][4150] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.365 [INFO][4150] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.374 [INFO][4150] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.381 [INFO][4150] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.383 [INFO][4150] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.385 [INFO][4150] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.385 [INFO][4150] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.389 [INFO][4150] ipam.go 1685: Creating new handle: k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.395 [INFO][4150] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.403 [INFO][4150] ipam.go 1216: Successfully claimed IPs: [192.168.56.1/26] block=192.168.56.0/26 handle="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.403 [INFO][4150] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.1/26] handle="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.403 [INFO][4150] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:04.454492 env[1438]: 2024-07-02 07:57:04.403 [INFO][4150] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.1/26] IPv6=[] ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" HandleID="k8s-pod-network.664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.406 [INFO][4138] k8s.go 386: Populated endpoint ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ec8b9f-989e-4541-8073-8daeb79c5e76", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"coredns-5dd5756b68-ck8m8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali84d5261de71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.406 [INFO][4138] k8s.go 387: Calico CNI using IPs: [192.168.56.1/32] ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.407 [INFO][4138] dataplane_linux.go 68: Setting the host side veth name to cali84d5261de71 ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.441 [INFO][4138] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.444 [INFO][4138] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ec8b9f-989e-4541-8073-8daeb79c5e76", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab", Pod:"coredns-5dd5756b68-ck8m8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali84d5261de71", MAC:"2a:10:71:8b:06:5a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:04.457279 env[1438]: 2024-07-02 07:57:04.452 [INFO][4138] k8s.go 500: Wrote updated endpoint to datastore ContainerID="664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab" Namespace="kube-system" Pod="coredns-5dd5756b68-ck8m8" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:04.480365 env[1438]: time="2024-07-02T07:57:04.480281902Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:04.480582 env[1438]: time="2024-07-02T07:57:04.480370302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:04.480582 env[1438]: time="2024-07-02T07:57:04.480397903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:04.480706 env[1438]: time="2024-07-02T07:57:04.480578004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab pid=4176 runtime=io.containerd.runc.v2 Jul 2 07:57:04.520154 systemd[1]: run-containerd-runc-k8s.io-664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab-runc.RUuXBh.mount: Deactivated successfully. Jul 2 07:57:04.524529 systemd[1]: Started cri-containerd-664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab.scope. Jul 2 07:57:04.530000 audit[4191]: NETFILTER_CFG table=filter:113 family=2 entries=34 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:04.530000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffecac2bf60 a2=0 a3=7ffecac2bf4c items=0 ppid=3938 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.530000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit: BPF prog-id=159 op=LOAD Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346231666431363939366461626662666364666330616535643639 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346231666431363939366461626662666364666330616535643639 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.548000 audit: BPF prog-id=160 op=LOAD Jul 2 07:57:04.548000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c6a20 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346231666431363939366461626662666364666330616535643639 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit: BPF prog-id=161 op=LOAD Jul 2 07:57:04.549000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c6a68 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346231666431363939366461626662666364666330616535643639 Jul 2 07:57:04.549000 audit: BPF prog-id=161 op=UNLOAD Jul 2 07:57:04.549000 audit: BPF prog-id=160 op=UNLOAD Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.549000 audit: BPF prog-id=162 op=LOAD Jul 2 07:57:04.549000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c6e78 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346231666431363939366461626662666364666330616535643639 Jul 2 07:57:04.597922 env[1438]: time="2024-07-02T07:57:04.597877201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ck8m8,Uid:b1ec8b9f-989e-4541-8073-8daeb79c5e76,Namespace:kube-system,Attempt:1,} returns sandbox id \"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab\"" Jul 2 07:57:04.603111 env[1438]: time="2024-07-02T07:57:04.603053036Z" level=info msg="CreateContainer within sandbox \"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:57:04.640565 env[1438]: time="2024-07-02T07:57:04.640451891Z" level=info msg="CreateContainer within sandbox \"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9a3fd5e4644602d75805125d418a9f731e63cf4b8fd669d1ede083a8f21740d4\"" Jul 2 07:57:04.641562 env[1438]: time="2024-07-02T07:57:04.641517698Z" level=info msg="StartContainer for \"9a3fd5e4644602d75805125d418a9f731e63cf4b8fd669d1ede083a8f21740d4\"" Jul 2 07:57:04.663057 systemd[1]: Started cri-containerd-9a3fd5e4644602d75805125d418a9f731e63cf4b8fd669d1ede083a8f21740d4.scope. Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.692000 audit: BPF prog-id=163 op=LOAD Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4176 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336664356534363434363032643735383035313235643431386139 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4176 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336664356534363434363032643735383035313235643431386139 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.693000 audit: BPF prog-id=164 op=LOAD Jul 2 07:57:04.693000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025910 items=0 ppid=4176 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336664356534363434363032643735383035313235643431386139 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit: BPF prog-id=165 op=LOAD Jul 2 07:57:04.694000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025958 items=0 ppid=4176 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336664356534363434363032643735383035313235643431386139 Jul 2 07:57:04.694000 audit: BPF prog-id=165 op=UNLOAD Jul 2 07:57:04.694000 audit: BPF prog-id=164 op=UNLOAD Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:04.694000 audit: BPF prog-id=166 op=LOAD Jul 2 07:57:04.694000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025d68 items=0 ppid=4176 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:04.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336664356534363434363032643735383035313235643431386139 Jul 2 07:57:04.725071 env[1438]: time="2024-07-02T07:57:04.725003966Z" level=info msg="StartContainer for \"9a3fd5e4644602d75805125d418a9f731e63cf4b8fd669d1ede083a8f21740d4\" returns successfully" Jul 2 07:57:05.091203 env[1438]: time="2024-07-02T07:57:05.091042151Z" level=info msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.141 [INFO][4263] k8s.go 608: Cleaning up netns ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.141 [INFO][4263] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" iface="eth0" netns="/var/run/netns/cni-1a447043-6810-52ff-8cd7-784f3739ea64" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.142 [INFO][4263] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" iface="eth0" netns="/var/run/netns/cni-1a447043-6810-52ff-8cd7-784f3739ea64" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.142 [INFO][4263] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" iface="eth0" netns="/var/run/netns/cni-1a447043-6810-52ff-8cd7-784f3739ea64" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.142 [INFO][4263] k8s.go 615: Releasing IP address(es) ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.142 [INFO][4263] utils.go 188: Calico CNI releasing IP address ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.161 [INFO][4269] ipam_plugin.go 411: Releasing address using handleID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.162 [INFO][4269] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.162 [INFO][4269] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.167 [WARNING][4269] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.167 [INFO][4269] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.168 [INFO][4269] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:05.171221 env[1438]: 2024-07-02 07:57:05.170 [INFO][4263] k8s.go 621: Teardown processing complete. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:05.172113 env[1438]: time="2024-07-02T07:57:05.171417395Z" level=info msg="TearDown network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" successfully" Jul 2 07:57:05.172113 env[1438]: time="2024-07-02T07:57:05.171462895Z" level=info msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" returns successfully" Jul 2 07:57:05.172981 env[1438]: time="2024-07-02T07:57:05.172947005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nr8cz,Uid:b5297c82-2d64-4187-bb29-5c66a9920b0d,Namespace:kube-system,Attempt:1,}" Jul 2 07:57:05.196861 systemd[1]: run-netns-cni\x2d1a447043\x2d6810\x2d52ff\x2d8cd7\x2d784f3739ea64.mount: Deactivated successfully. Jul 2 07:57:05.327264 systemd-networkd[1587]: cali7519a63b342: Link UP Jul 2 07:57:05.335971 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7519a63b342: link becomes ready Jul 2 07:57:05.336114 kubelet[2596]: I0702 07:57:05.330919 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-ck8m8" podStartSLOduration=45.330873273 podCreationTimestamp="2024-07-02 07:56:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:05.330183868 +0000 UTC m=+54.378074287" watchObservedRunningTime="2024-07-02 07:57:05.330873273 +0000 UTC m=+54.378763692" Jul 2 07:57:05.337134 systemd-networkd[1587]: cali7519a63b342: Gained carrier Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.252 [INFO][4276] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0 coredns-5dd5756b68- kube-system b5297c82-2d64-4187-bb29-5c66a9920b0d 835 0 2024-07-02 07:56:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 coredns-5dd5756b68-nr8cz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7519a63b342 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.253 [INFO][4276] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.277 [INFO][4287] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" HandleID="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.286 [INFO][4287] ipam_plugin.go 264: Auto assigning IP ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" HandleID="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efc70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-195c2606d4", "pod":"coredns-5dd5756b68-nr8cz", "timestamp":"2024-07-02 07:57:05.277746314 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.286 [INFO][4287] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.286 [INFO][4287] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.286 [INFO][4287] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.288 [INFO][4287] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.291 [INFO][4287] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.294 [INFO][4287] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.296 [INFO][4287] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.298 [INFO][4287] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.298 [INFO][4287] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.299 [INFO][4287] ipam.go 1685: Creating new handle: k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6 Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.302 [INFO][4287] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.307 [INFO][4287] ipam.go 1216: Successfully claimed IPs: [192.168.56.2/26] block=192.168.56.0/26 handle="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.307 [INFO][4287] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.2/26] handle="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.307 [INFO][4287] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:05.360902 env[1438]: 2024-07-02 07:57:05.307 [INFO][4287] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.2/26] IPv6=[] ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" HandleID="k8s-pod-network.217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.308 [INFO][4276] k8s.go 386: Populated endpoint ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b5297c82-2d64-4187-bb29-5c66a9920b0d", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"coredns-5dd5756b68-nr8cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7519a63b342", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.308 [INFO][4276] k8s.go 387: Calico CNI using IPs: [192.168.56.2/32] ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.309 [INFO][4276] dataplane_linux.go 68: Setting the host side veth name to cali7519a63b342 ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.338 [INFO][4276] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.339 [INFO][4276] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b5297c82-2d64-4187-bb29-5c66a9920b0d", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6", Pod:"coredns-5dd5756b68-nr8cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7519a63b342", MAC:"06:e1:93:46:8e:50", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:05.361922 env[1438]: 2024-07-02 07:57:05.357 [INFO][4276] k8s.go 500: Wrote updated endpoint to datastore ContainerID="217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6" Namespace="kube-system" Pod="coredns-5dd5756b68-nr8cz" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:05.371872 kernel: kauditd_printk_skb: 298 callbacks suppressed Jul 2 07:57:05.372019 kernel: audit: type=1325 audit(1719907025.364:1049): table=filter:114 family=2 entries=14 op=nft_register_rule pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.364000 audit[4297]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.364000 audit[4297]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff416063c0 a2=0 a3=7fff416063ac items=0 ppid=2730 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.416867 kernel: audit: type=1300 audit(1719907025.364:1049): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff416063c0 a2=0 a3=7fff416063ac items=0 ppid=2730 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.425233 env[1438]: time="2024-07-02T07:57:05.425153611Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:05.425454 env[1438]: time="2024-07-02T07:57:05.425254811Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:05.425454 env[1438]: time="2024-07-02T07:57:05.425284911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:05.425585 env[1438]: time="2024-07-02T07:57:05.425479213Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6 pid=4317 runtime=io.containerd.runc.v2 Jul 2 07:57:05.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.455877 kernel: audit: type=1327 audit(1719907025.364:1049): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.392000 audit[4297]: NETFILTER_CFG table=nat:115 family=2 entries=14 op=nft_register_rule pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.392000 audit[4297]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff416063c0 a2=0 a3=0 items=0 ppid=2730 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.478189 systemd[1]: Started cri-containerd-217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6.scope. Jul 2 07:57:05.515446 kernel: audit: type=1325 audit(1719907025.392:1050): table=nat:115 family=2 entries=14 op=nft_register_rule pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.515655 kernel: audit: type=1300 audit(1719907025.392:1050): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff416063c0 a2=0 a3=0 items=0 ppid=2730 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.515708 kernel: audit: type=1327 audit(1719907025.392:1050): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.529186 kernel: audit: type=1325 audit(1719907025.411:1051): table=filter:116 family=2 entries=11 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.529319 kernel: audit: type=1300 audit(1719907025.411:1051): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffce524bda0 a2=0 a3=7ffce524bd8c items=0 ppid=2730 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.411000 audit[4311]: NETFILTER_CFG table=filter:116 family=2 entries=11 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.411000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffce524bda0 a2=0 a3=7ffce524bd8c items=0 ppid=2730 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.563127 kernel: audit: type=1327 audit(1719907025.411:1051): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.565287 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:57:05.422000 audit[4311]: NETFILTER_CFG table=nat:117 family=2 entries=35 op=nft_register_chain pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:05.422000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffce524bda0 a2=0 a3=7ffce524bd8c items=0 ppid=2730 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:05.454000 audit[4310]: NETFILTER_CFG table=filter:118 family=2 entries=30 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:05.454000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffc3e148b80 a2=0 a3=7ffc3e148b6c items=0 ppid=3938 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.454000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.514000 audit: BPF prog-id=167 op=LOAD Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4317 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376338623038303837623638383336653061393430323832366237 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4317 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376338623038303837623638383336653061393430323832366237 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.515000 audit: BPF prog-id=168 op=LOAD Jul 2 07:57:05.515000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001bfff0 items=0 ppid=4317 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376338623038303837623638383336653061393430323832366237 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.550000 audit: BPF prog-id=169 op=LOAD Jul 2 07:57:05.550000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a8038 items=0 ppid=4317 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376338623038303837623638383336653061393430323832366237 Jul 2 07:57:05.562000 audit: BPF prog-id=169 op=UNLOAD Jul 2 07:57:05.562000 audit: BPF prog-id=168 op=UNLOAD Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.562000 audit: BPF prog-id=170 op=LOAD Jul 2 07:57:05.562000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a8448 items=0 ppid=4317 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376338623038303837623638383336653061393430323832366237 Jul 2 07:57:05.599522 env[1438]: time="2024-07-02T07:57:05.598473183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nr8cz,Uid:b5297c82-2d64-4187-bb29-5c66a9920b0d,Namespace:kube-system,Attempt:1,} returns sandbox id \"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6\"" Jul 2 07:57:05.601901 env[1438]: time="2024-07-02T07:57:05.601495203Z" level=info msg="CreateContainer within sandbox \"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:57:05.654718 env[1438]: time="2024-07-02T07:57:05.647821816Z" level=info msg="CreateContainer within sandbox \"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ef2392821365c13c7218c4504edf7f888cef3bd81a94b9d510fbb95d674d26f6\"" Jul 2 07:57:05.654718 env[1438]: time="2024-07-02T07:57:05.648919624Z" level=info msg="StartContainer for \"ef2392821365c13c7218c4504edf7f888cef3bd81a94b9d510fbb95d674d26f6\"" Jul 2 07:57:05.669756 systemd[1]: Started cri-containerd-ef2392821365c13c7218c4504edf7f888cef3bd81a94b9d510fbb95d674d26f6.scope. Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.685000 audit: BPF prog-id=171 op=LOAD Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4317 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566323339323832313336356331336337323138633435303465646637 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4317 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566323339323832313336356331336337323138633435303465646637 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit: BPF prog-id=172 op=LOAD Jul 2 07:57:05.686000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025bd20 items=0 ppid=4317 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566323339323832313336356331336337323138633435303465646637 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.686000 audit: BPF prog-id=173 op=LOAD Jul 2 07:57:05.686000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025bd68 items=0 ppid=4317 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566323339323832313336356331336337323138633435303465646637 Jul 2 07:57:05.686000 audit: BPF prog-id=173 op=UNLOAD Jul 2 07:57:05.686000 audit: BPF prog-id=172 op=UNLOAD Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:05.687000 audit: BPF prog-id=174 op=LOAD Jul 2 07:57:05.687000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8178 items=0 ppid=4317 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:05.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566323339323832313336356331336337323138633435303465646637 Jul 2 07:57:05.708915 env[1438]: time="2024-07-02T07:57:05.708852129Z" level=info msg="StartContainer for \"ef2392821365c13c7218c4504edf7f888cef3bd81a94b9d510fbb95d674d26f6\" returns successfully" Jul 2 07:57:06.091259 env[1438]: time="2024-07-02T07:57:06.091198611Z" level=info msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" Jul 2 07:57:06.092558 systemd-networkd[1587]: cali84d5261de71: Gained IPv6LL Jul 2 07:57:06.093680 env[1438]: time="2024-07-02T07:57:06.093526827Z" level=info msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.176 [INFO][4416] k8s.go 608: Cleaning up netns ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.177 [INFO][4416] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" iface="eth0" netns="/var/run/netns/cni-e6e54a96-60bf-2cfe-ae02-b1118a08798c" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.177 [INFO][4416] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" iface="eth0" netns="/var/run/netns/cni-e6e54a96-60bf-2cfe-ae02-b1118a08798c" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.177 [INFO][4416] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" iface="eth0" netns="/var/run/netns/cni-e6e54a96-60bf-2cfe-ae02-b1118a08798c" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.177 [INFO][4416] k8s.go 615: Releasing IP address(es) ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.177 [INFO][4416] utils.go 188: Calico CNI releasing IP address ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.237 [INFO][4427] ipam_plugin.go 411: Releasing address using handleID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.237 [INFO][4427] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.237 [INFO][4427] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.246 [WARNING][4427] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.246 [INFO][4427] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.248 [INFO][4427] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:06.253158 env[1438]: 2024-07-02 07:57:06.252 [INFO][4416] k8s.go 621: Teardown processing complete. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:06.258675 systemd[1]: run-netns-cni\x2de6e54a96\x2d60bf\x2d2cfe\x2dae02\x2db1118a08798c.mount: Deactivated successfully. Jul 2 07:57:06.260056 env[1438]: time="2024-07-02T07:57:06.260002847Z" level=info msg="TearDown network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" successfully" Jul 2 07:57:06.260224 env[1438]: time="2024-07-02T07:57:06.260202148Z" level=info msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" returns successfully" Jul 2 07:57:06.261446 env[1438]: time="2024-07-02T07:57:06.261408357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h8rtq,Uid:bc2d8944-2264-43ed-9cd6-a64fde16f9a3,Namespace:calico-system,Attempt:1,}" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.201 [INFO][4411] k8s.go 608: Cleaning up netns ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.201 [INFO][4411] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" iface="eth0" netns="/var/run/netns/cni-722c166d-1e5d-22d4-a796-0e1f473f64cd" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.202 [INFO][4411] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" iface="eth0" netns="/var/run/netns/cni-722c166d-1e5d-22d4-a796-0e1f473f64cd" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.202 [INFO][4411] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" iface="eth0" netns="/var/run/netns/cni-722c166d-1e5d-22d4-a796-0e1f473f64cd" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.202 [INFO][4411] k8s.go 615: Releasing IP address(es) ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.202 [INFO][4411] utils.go 188: Calico CNI releasing IP address ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.244 [INFO][4431] ipam_plugin.go 411: Releasing address using handleID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.244 [INFO][4431] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.248 [INFO][4431] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.263 [WARNING][4431] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.263 [INFO][4431] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.265 [INFO][4431] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:06.267420 env[1438]: 2024-07-02 07:57:06.266 [INFO][4411] k8s.go 621: Teardown processing complete. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:06.276011 env[1438]: time="2024-07-02T07:57:06.270936121Z" level=info msg="TearDown network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" successfully" Jul 2 07:57:06.276011 env[1438]: time="2024-07-02T07:57:06.270986421Z" level=info msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" returns successfully" Jul 2 07:57:06.274245 systemd[1]: run-netns-cni\x2d722c166d\x2d1e5d\x2d22d4\x2da796\x2d0e1f473f64cd.mount: Deactivated successfully. Jul 2 07:57:06.276629 env[1438]: time="2024-07-02T07:57:06.276573259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ffdc4fbf-dl76k,Uid:7b1b1833-060b-4dfd-a29b-39e0e87048c8,Namespace:calico-system,Attempt:1,}" Jul 2 07:57:06.331835 kubelet[2596]: I0702 07:57:06.331780 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-nr8cz" podStartSLOduration=46.33171963 podCreationTimestamp="2024-07-02 07:56:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:06.331238726 +0000 UTC m=+55.379129245" watchObservedRunningTime="2024-07-02 07:57:06.33171963 +0000 UTC m=+55.379610049" Jul 2 07:57:06.425000 audit[4451]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:06.425000 audit[4451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff3455fec0 a2=0 a3=7fff3455feac items=0 ppid=2730 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:06.437000 audit[4451]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:06.437000 audit[4451]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff3455fec0 a2=0 a3=7fff3455feac items=0 ppid=2730 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:06.474037 systemd-networkd[1587]: cali7519a63b342: Gained IPv6LL Jul 2 07:57:06.602839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:06.614883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali985a1959c9f: link becomes ready Jul 2 07:57:06.617143 systemd-networkd[1587]: cali985a1959c9f: Link UP Jul 2 07:57:06.617583 systemd-networkd[1587]: cali985a1959c9f: Gained carrier Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.496 [INFO][4450] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0 calico-kube-controllers-79ffdc4fbf- calico-system 7b1b1833-060b-4dfd-a29b-39e0e87048c8 855 0 2024-07-02 07:56:29 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79ffdc4fbf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 calico-kube-controllers-79ffdc4fbf-dl76k eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali985a1959c9f [] []}} ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.497 [INFO][4450] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.543 [INFO][4469] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" HandleID="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.554 [INFO][4469] ipam_plugin.go 264: Auto assigning IP ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" HandleID="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312360), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-195c2606d4", "pod":"calico-kube-controllers-79ffdc4fbf-dl76k", "timestamp":"2024-07-02 07:57:06.543497954 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.555 [INFO][4469] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.555 [INFO][4469] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.555 [INFO][4469] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.558 [INFO][4469] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.562 [INFO][4469] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.567 [INFO][4469] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.569 [INFO][4469] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.573 [INFO][4469] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.573 [INFO][4469] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.575 [INFO][4469] ipam.go 1685: Creating new handle: k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.578 [INFO][4469] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.583 [INFO][4469] ipam.go 1216: Successfully claimed IPs: [192.168.56.3/26] block=192.168.56.0/26 handle="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.583 [INFO][4469] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.3/26] handle="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.583 [INFO][4469] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:06.632141 env[1438]: 2024-07-02 07:57:06.584 [INFO][4469] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.3/26] IPv6=[] ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" HandleID="k8s-pod-network.eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.585 [INFO][4450] k8s.go 386: Populated endpoint ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0", GenerateName:"calico-kube-controllers-79ffdc4fbf-", Namespace:"calico-system", SelfLink:"", UID:"7b1b1833-060b-4dfd-a29b-39e0e87048c8", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ffdc4fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"calico-kube-controllers-79ffdc4fbf-dl76k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985a1959c9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.586 [INFO][4450] k8s.go 387: Calico CNI using IPs: [192.168.56.3/32] ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.586 [INFO][4450] dataplane_linux.go 68: Setting the host side veth name to cali985a1959c9f ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.616 [INFO][4450] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.617 [INFO][4450] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0", GenerateName:"calico-kube-controllers-79ffdc4fbf-", Namespace:"calico-system", SelfLink:"", UID:"7b1b1833-060b-4dfd-a29b-39e0e87048c8", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ffdc4fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c", Pod:"calico-kube-controllers-79ffdc4fbf-dl76k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985a1959c9f", MAC:"8a:49:e2:35:7a:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:06.633156 env[1438]: 2024-07-02 07:57:06.630 [INFO][4450] k8s.go 500: Wrote updated endpoint to datastore ContainerID="eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c" Namespace="calico-system" Pod="calico-kube-controllers-79ffdc4fbf-dl76k" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:06.673000 audit[4498]: NETFILTER_CFG table=filter:121 family=2 entries=42 op=nft_register_chain pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:06.673000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffdd3eb1520 a2=0 a3=7ffdd3eb150c items=0 ppid=3938 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:06.681644 systemd-networkd[1587]: caliaeb37be08aa: Link UP Jul 2 07:57:06.687830 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaeb37be08aa: link becomes ready Jul 2 07:57:06.688183 systemd-networkd[1587]: caliaeb37be08aa: Gained carrier Jul 2 07:57:06.711043 env[1438]: time="2024-07-02T07:57:06.709752273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:06.711043 env[1438]: time="2024-07-02T07:57:06.709879273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:06.711043 env[1438]: time="2024-07-02T07:57:06.709910174Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:06.711043 env[1438]: time="2024-07-02T07:57:06.710267576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c pid=4501 runtime=io.containerd.runc.v2 Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.497 [INFO][4441] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0 csi-node-driver- calico-system bc2d8944-2264-43ed-9cd6-a64fde16f9a3 854 0 2024-07-02 07:56:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 csi-node-driver-h8rtq eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliaeb37be08aa [] []}} ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.498 [INFO][4441] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.566 [INFO][4474] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" HandleID="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.576 [INFO][4474] ipam_plugin.go 264: Auto assigning IP ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" HandleID="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003222e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-195c2606d4", "pod":"csi-node-driver-h8rtq", "timestamp":"2024-07-02 07:57:06.566121806 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.576 [INFO][4474] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.583 [INFO][4474] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.583 [INFO][4474] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.589 [INFO][4474] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.634 [INFO][4474] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.644 [INFO][4474] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.646 [INFO][4474] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.650 [INFO][4474] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.650 [INFO][4474] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.653 [INFO][4474] ipam.go 1685: Creating new handle: k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00 Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.659 [INFO][4474] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.667 [INFO][4474] ipam.go 1216: Successfully claimed IPs: [192.168.56.4/26] block=192.168.56.0/26 handle="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.667 [INFO][4474] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.4/26] handle="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.667 [INFO][4474] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:06.715842 env[1438]: 2024-07-02 07:57:06.667 [INFO][4474] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.4/26] IPv6=[] ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" HandleID="k8s-pod-network.046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.670 [INFO][4441] k8s.go 386: Populated endpoint ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bc2d8944-2264-43ed-9cd6-a64fde16f9a3", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"csi-node-driver-h8rtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.56.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliaeb37be08aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.670 [INFO][4441] k8s.go 387: Calico CNI using IPs: [192.168.56.4/32] ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.670 [INFO][4441] dataplane_linux.go 68: Setting the host side veth name to caliaeb37be08aa ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.697 [INFO][4441] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.697 [INFO][4441] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bc2d8944-2264-43ed-9cd6-a64fde16f9a3", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00", Pod:"csi-node-driver-h8rtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.56.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliaeb37be08aa", MAC:"7a:23:66:3f:46:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:06.716989 env[1438]: 2024-07-02 07:57:06.712 [INFO][4441] k8s.go 500: Wrote updated endpoint to datastore ContainerID="046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00" Namespace="calico-system" Pod="csi-node-driver-h8rtq" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:06.745236 systemd[1]: Started cri-containerd-eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c.scope. Jul 2 07:57:06.753000 audit[4541]: NETFILTER_CFG table=filter:122 family=2 entries=42 op=nft_register_chain pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:06.753000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffd4edbea70 a2=0 a3=7ffd4edbea5c items=0 ppid=3938 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.753000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:06.767445 env[1438]: time="2024-07-02T07:57:06.767181959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:06.768008 env[1438]: time="2024-07-02T07:57:06.767959264Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:06.770526 env[1438]: time="2024-07-02T07:57:06.770470881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:06.771171 env[1438]: time="2024-07-02T07:57:06.771113385Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00 pid=4540 runtime=io.containerd.runc.v2 Jul 2 07:57:06.791870 systemd[1]: Started cri-containerd-046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00.scope. Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.801000 audit: BPF prog-id=175 op=LOAD Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4501 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663233376438313761316433343661656563303534613061303630 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4501 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663233376438313761316433343661656563303534613061303630 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.802000 audit: BPF prog-id=176 op=LOAD Jul 2 07:57:06.802000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ee00 items=0 ppid=4501 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663233376438313761316433343661656563303534613061303630 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.803000 audit: BPF prog-id=177 op=LOAD Jul 2 07:57:06.803000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ee48 items=0 ppid=4501 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663233376438313761316433343661656563303534613061303630 Jul 2 07:57:06.805000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:57:06.805000 audit: BPF prog-id=176 op=UNLOAD Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.805000 audit: BPF prog-id=178 op=LOAD Jul 2 07:57:06.805000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f258 items=0 ppid=4501 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663233376438313761316433343661656563303534613061303630 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit: BPF prog-id=179 op=LOAD Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4540 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034366163636566376232636564623034376266376239663934313034 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4540 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034366163636566376232636564623034376266376239663934313034 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit: BPF prog-id=180 op=LOAD Jul 2 07:57:06.823000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000309630 items=0 ppid=4540 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034366163636566376232636564623034376266376239663934313034 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.823000 audit: BPF prog-id=181 op=LOAD Jul 2 07:57:06.823000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000309678 items=0 ppid=4540 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034366163636566376232636564623034376266376239663934313034 Jul 2 07:57:06.824000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:57:06.824000 audit: BPF prog-id=180 op=UNLOAD Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:06.824000 audit: BPF prog-id=182 op=LOAD Jul 2 07:57:06.824000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000309a88 items=0 ppid=4540 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:06.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034366163636566376232636564623034376266376239663934313034 Jul 2 07:57:06.850547 env[1438]: time="2024-07-02T07:57:06.850494719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h8rtq,Uid:bc2d8944-2264-43ed-9cd6-a64fde16f9a3,Namespace:calico-system,Attempt:1,} returns sandbox id \"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00\"" Jul 2 07:57:06.857736 env[1438]: time="2024-07-02T07:57:06.856506960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ffdc4fbf-dl76k,Uid:7b1b1833-060b-4dfd-a29b-39e0e87048c8,Namespace:calico-system,Attempt:1,} returns sandbox id \"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c\"" Jul 2 07:57:06.857736 env[1438]: time="2024-07-02T07:57:06.857622267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:57:07.485000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.485000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288b2e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:07.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:07.487000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.487000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00288b300 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:07.487000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:07.489000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.489000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288b4a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:07.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:07.490000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.490000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288b4c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:57:07.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:08.138452 systemd-networkd[1587]: cali985a1959c9f: Gained IPv6LL Jul 2 07:57:08.522151 systemd-networkd[1587]: caliaeb37be08aa: Gained IPv6LL Jul 2 07:57:08.774769 env[1438]: time="2024-07-02T07:57:08.774616977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:08.783402 env[1438]: time="2024-07-02T07:57:08.783350235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:08.787513 env[1438]: time="2024-07-02T07:57:08.787459562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:08.793925 env[1438]: time="2024-07-02T07:57:08.793874105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:08.795174 env[1438]: time="2024-07-02T07:57:08.795053213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:57:08.801091 env[1438]: time="2024-07-02T07:57:08.799339541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:57:08.806241 env[1438]: time="2024-07-02T07:57:08.806199587Z" level=info msg="CreateContainer within sandbox \"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:57:08.846970 env[1438]: time="2024-07-02T07:57:08.846912758Z" level=info msg="CreateContainer within sandbox \"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7e0152b48bf11f2792dd5a70ff315f0150c93c690c085a4722097a4e7445f1f3\"" Jul 2 07:57:08.849236 env[1438]: time="2024-07-02T07:57:08.847835164Z" level=info msg="StartContainer for \"7e0152b48bf11f2792dd5a70ff315f0150c93c690c085a4722097a4e7445f1f3\"" Jul 2 07:57:08.886256 systemd[1]: Started cri-containerd-7e0152b48bf11f2792dd5a70ff315f0150c93c690c085a4722097a4e7445f1f3.scope. Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3fe1060568 items=0 ppid=4540 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:08.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303135326234386266313166323739326464356137306666333135 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit: BPF prog-id=183 op=LOAD Jul 2 07:57:08.905000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002163d8 items=0 ppid=4540 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:08.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303135326234386266313166323739326464356137306666333135 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit: BPF prog-id=184 op=LOAD Jul 2 07:57:08.905000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000216428 items=0 ppid=4540 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:08.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303135326234386266313166323739326464356137306666333135 Jul 2 07:57:08.905000 audit: BPF prog-id=184 op=UNLOAD Jul 2 07:57:08.905000 audit: BPF prog-id=183 op=UNLOAD Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:08.905000 audit: BPF prog-id=185 op=LOAD Jul 2 07:57:08.905000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002164b8 items=0 ppid=4540 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:08.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303135326234386266313166323739326464356137306666333135 Jul 2 07:57:08.929316 env[1438]: time="2024-07-02T07:57:08.929258007Z" level=info msg="StartContainer for \"7e0152b48bf11f2792dd5a70ff315f0150c93c690c085a4722097a4e7445f1f3\" returns successfully" Jul 2 07:57:11.108895 env[1438]: time="2024-07-02T07:57:11.108772316Z" level=info msg="StopPodSandbox for \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\"" Jul 2 07:57:11.109866 env[1438]: time="2024-07-02T07:57:11.109015617Z" level=info msg="TearDown network for sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" successfully" Jul 2 07:57:11.110025 env[1438]: time="2024-07-02T07:57:11.109940124Z" level=info msg="StopPodSandbox for \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" returns successfully" Jul 2 07:57:11.110994 env[1438]: time="2024-07-02T07:57:11.110959730Z" level=info msg="RemovePodSandbox for \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\"" Jul 2 07:57:11.111239 env[1438]: time="2024-07-02T07:57:11.111001730Z" level=info msg="Forcibly stopping sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\"" Jul 2 07:57:11.111239 env[1438]: time="2024-07-02T07:57:11.111181632Z" level=info msg="TearDown network for sandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" successfully" Jul 2 07:57:11.125895 env[1438]: time="2024-07-02T07:57:11.125711927Z" level=info msg="RemovePodSandbox \"92f6f48fce7d6b253c3e6b3069afa9ad6b300fb352d8e0bce2f692f19938767f\" returns successfully" Jul 2 07:57:11.127019 env[1438]: time="2024-07-02T07:57:11.126934135Z" level=info msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.230 [WARNING][4642] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ec8b9f-989e-4541-8073-8daeb79c5e76", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab", Pod:"coredns-5dd5756b68-ck8m8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali84d5261de71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.230 [INFO][4642] k8s.go 608: Cleaning up netns ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.230 [INFO][4642] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" iface="eth0" netns="" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.230 [INFO][4642] k8s.go 615: Releasing IP address(es) ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.230 [INFO][4642] utils.go 188: Calico CNI releasing IP address ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.269 [INFO][4648] ipam_plugin.go 411: Releasing address using handleID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.269 [INFO][4648] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.270 [INFO][4648] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.281 [WARNING][4648] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.281 [INFO][4648] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.283 [INFO][4648] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:11.286154 env[1438]: 2024-07-02 07:57:11.284 [INFO][4642] k8s.go 621: Teardown processing complete. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.287168 env[1438]: time="2024-07-02T07:57:11.286196581Z" level=info msg="TearDown network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" successfully" Jul 2 07:57:11.287168 env[1438]: time="2024-07-02T07:57:11.286239181Z" level=info msg="StopPodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" returns successfully" Jul 2 07:57:11.287260 env[1438]: time="2024-07-02T07:57:11.287181087Z" level=info msg="RemovePodSandbox for \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" Jul 2 07:57:11.287304 env[1438]: time="2024-07-02T07:57:11.287239688Z" level=info msg="Forcibly stopping sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\"" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.409 [WARNING][4667] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ec8b9f-989e-4541-8073-8daeb79c5e76", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"664b1fd16996dabfbfcdfc0ae5d694437c8fb606264578eb71035436981fc2ab", Pod:"coredns-5dd5756b68-ck8m8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali84d5261de71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.410 [INFO][4667] k8s.go 608: Cleaning up netns ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.410 [INFO][4667] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" iface="eth0" netns="" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.410 [INFO][4667] k8s.go 615: Releasing IP address(es) ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.410 [INFO][4667] utils.go 188: Calico CNI releasing IP address ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.456 [INFO][4673] ipam_plugin.go 411: Releasing address using handleID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.456 [INFO][4673] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.457 [INFO][4673] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.466 [WARNING][4673] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.466 [INFO][4673] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" HandleID="k8s-pod-network.6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--ck8m8-eth0" Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.468 [INFO][4673] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:11.471443 env[1438]: 2024-07-02 07:57:11.469 [INFO][4667] k8s.go 621: Teardown processing complete. ContainerID="6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e" Jul 2 07:57:11.472307 env[1438]: time="2024-07-02T07:57:11.472260003Z" level=info msg="TearDown network for sandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" successfully" Jul 2 07:57:11.481567 env[1438]: time="2024-07-02T07:57:11.481510763Z" level=info msg="RemovePodSandbox \"6650b2f2f75696b660fe40614651c88d148af0e74a0844312761a128296d4e7e\" returns successfully" Jul 2 07:57:11.482375 env[1438]: time="2024-07-02T07:57:11.482345169Z" level=info msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.574 [WARNING][4694] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0", GenerateName:"calico-kube-controllers-79ffdc4fbf-", Namespace:"calico-system", SelfLink:"", UID:"7b1b1833-060b-4dfd-a29b-39e0e87048c8", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ffdc4fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c", Pod:"calico-kube-controllers-79ffdc4fbf-dl76k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985a1959c9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.574 [INFO][4694] k8s.go 608: Cleaning up netns ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.574 [INFO][4694] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" iface="eth0" netns="" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.574 [INFO][4694] k8s.go 615: Releasing IP address(es) ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.574 [INFO][4694] utils.go 188: Calico CNI releasing IP address ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.608 [INFO][4700] ipam_plugin.go 411: Releasing address using handleID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.609 [INFO][4700] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.609 [INFO][4700] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.616 [WARNING][4700] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.616 [INFO][4700] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.618 [INFO][4700] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:11.620663 env[1438]: 2024-07-02 07:57:11.619 [INFO][4694] k8s.go 621: Teardown processing complete. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.621482 env[1438]: time="2024-07-02T07:57:11.621438682Z" level=info msg="TearDown network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" successfully" Jul 2 07:57:11.621560 env[1438]: time="2024-07-02T07:57:11.621544383Z" level=info msg="StopPodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" returns successfully" Jul 2 07:57:11.622380 env[1438]: time="2024-07-02T07:57:11.622350888Z" level=info msg="RemovePodSandbox for \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" Jul 2 07:57:11.622558 env[1438]: time="2024-07-02T07:57:11.622512489Z" level=info msg="Forcibly stopping sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\"" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.725 [WARNING][4721] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0", GenerateName:"calico-kube-controllers-79ffdc4fbf-", Namespace:"calico-system", SelfLink:"", UID:"7b1b1833-060b-4dfd-a29b-39e0e87048c8", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ffdc4fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c", Pod:"calico-kube-controllers-79ffdc4fbf-dl76k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985a1959c9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.725 [INFO][4721] k8s.go 608: Cleaning up netns ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.725 [INFO][4721] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" iface="eth0" netns="" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.725 [INFO][4721] k8s.go 615: Releasing IP address(es) ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.725 [INFO][4721] utils.go 188: Calico CNI releasing IP address ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.781 [INFO][4727] ipam_plugin.go 411: Releasing address using handleID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.782 [INFO][4727] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.782 [INFO][4727] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.794 [WARNING][4727] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.794 [INFO][4727] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" HandleID="k8s-pod-network.9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--kube--controllers--79ffdc4fbf--dl76k-eth0" Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.796 [INFO][4727] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:11.799960 env[1438]: 2024-07-02 07:57:11.798 [INFO][4721] k8s.go 621: Teardown processing complete. ContainerID="9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e" Jul 2 07:57:11.802462 env[1438]: time="2024-07-02T07:57:11.802402570Z" level=info msg="TearDown network for sandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" successfully" Jul 2 07:57:11.813965 env[1438]: time="2024-07-02T07:57:11.813905946Z" level=info msg="RemovePodSandbox \"9ae02f41d7dc73b2a2e1807437f30e984b086948987e4e87f4f7e1847107906e\" returns successfully" Jul 2 07:57:11.814684 env[1438]: time="2024-07-02T07:57:11.814636351Z" level=info msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" Jul 2 07:57:11.913823 env[1438]: time="2024-07-02T07:57:11.913754001Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:11.922125 env[1438]: time="2024-07-02T07:57:11.922070156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:11.926582 env[1438]: time="2024-07-02T07:57:11.926533685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:11.933710 env[1438]: time="2024-07-02T07:57:11.933669532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:11.934212 env[1438]: time="2024-07-02T07:57:11.934159135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:57:11.937692 env[1438]: time="2024-07-02T07:57:11.937651158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:57:11.954870 env[1438]: time="2024-07-02T07:57:11.952587656Z" level=info msg="CreateContainer within sandbox \"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.902 [WARNING][4750] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bc2d8944-2264-43ed-9cd6-a64fde16f9a3", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00", Pod:"csi-node-driver-h8rtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.56.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliaeb37be08aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.903 [INFO][4750] k8s.go 608: Cleaning up netns ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.903 [INFO][4750] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" iface="eth0" netns="" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.903 [INFO][4750] k8s.go 615: Releasing IP address(es) ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.903 [INFO][4750] utils.go 188: Calico CNI releasing IP address ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.929 [INFO][4756] ipam_plugin.go 411: Releasing address using handleID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.930 [INFO][4756] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.930 [INFO][4756] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.949 [WARNING][4756] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.949 [INFO][4756] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.951 [INFO][4756] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:11.958711 env[1438]: 2024-07-02 07:57:11.957 [INFO][4750] k8s.go 621: Teardown processing complete. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:11.959537 env[1438]: time="2024-07-02T07:57:11.958746397Z" level=info msg="TearDown network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" successfully" Jul 2 07:57:11.959537 env[1438]: time="2024-07-02T07:57:11.958780497Z" level=info msg="StopPodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" returns successfully" Jul 2 07:57:11.960154 env[1438]: time="2024-07-02T07:57:11.959873204Z" level=info msg="RemovePodSandbox for \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" Jul 2 07:57:11.960154 env[1438]: time="2024-07-02T07:57:11.959915305Z" level=info msg="Forcibly stopping sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\"" Jul 2 07:57:12.001409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3976848809.mount: Deactivated successfully. Jul 2 07:57:12.019661 env[1438]: time="2024-07-02T07:57:12.019599696Z" level=info msg="CreateContainer within sandbox \"eaf237d817a1d346aeec054a0a060ca5aaa01d76147c26deeef82295dd5e6e5c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444\"" Jul 2 07:57:12.022144 env[1438]: time="2024-07-02T07:57:12.022087112Z" level=info msg="StartContainer for \"746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444\"" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.009 [WARNING][4779] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bc2d8944-2264-43ed-9cd6-a64fde16f9a3", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00", Pod:"csi-node-driver-h8rtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.56.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliaeb37be08aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.009 [INFO][4779] k8s.go 608: Cleaning up netns ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.010 [INFO][4779] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" iface="eth0" netns="" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.010 [INFO][4779] k8s.go 615: Releasing IP address(es) ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.010 [INFO][4779] utils.go 188: Calico CNI releasing IP address ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.047 [INFO][4785] ipam_plugin.go 411: Releasing address using handleID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.048 [INFO][4785] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.048 [INFO][4785] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.054 [WARNING][4785] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.054 [INFO][4785] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" HandleID="k8s-pod-network.ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Workload="ci--3510.3.5--a--195c2606d4-k8s-csi--node--driver--h8rtq-eth0" Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.056 [INFO][4785] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:12.059893 env[1438]: 2024-07-02 07:57:12.058 [INFO][4779] k8s.go 621: Teardown processing complete. ContainerID="ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b" Jul 2 07:57:12.060768 env[1438]: time="2024-07-02T07:57:12.060704265Z" level=info msg="TearDown network for sandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" successfully" Jul 2 07:57:12.071477 systemd[1]: Started cri-containerd-746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444.scope. Jul 2 07:57:12.081840 env[1438]: time="2024-07-02T07:57:12.081739402Z" level=info msg="RemovePodSandbox \"ccf65b3abee34de135edf15bef0164379c5b5755946f8fcc6fcb66d0f0364e9b\" returns successfully" Jul 2 07:57:12.086873 env[1438]: time="2024-07-02T07:57:12.086778435Z" level=info msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" Jul 2 07:57:12.117063 kernel: kauditd_printk_skb: 302 callbacks suppressed Jul 2 07:57:12.117210 kernel: audit: type=1400 audit(1719907032.097:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.132792 kernel: audit: type=1400 audit(1719907032.097:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.133030 kernel: audit: type=1400 audit(1719907032.097:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.160486 kernel: audit: type=1400 audit(1719907032.097:1143): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.192424 kernel: audit: type=1400 audit(1719907032.097:1144): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.192555 kernel: audit: type=1400 audit(1719907032.097:1145): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.192659 kernel: audit: type=1400 audit(1719907032.097:1146): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.227824 kernel: audit: type=1400 audit(1719907032.097:1147): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.248010 kernel: audit: type=1400 audit(1719907032.097:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.248071 kernel: audit: type=1400 audit(1719907032.097:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.097000 audit: BPF prog-id=186 op=LOAD Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4501 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734366164653932363163363731393466313138353033626438616162 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4501 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734366164653932363163363731393466313138353033626438616162 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.117000 audit: BPF prog-id=187 op=LOAD Jul 2 07:57:12.117000 audit[4798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000360090 items=0 ppid=4501 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734366164653932363163363731393466313138353033626438616162 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.180000 audit: BPF prog-id=188 op=LOAD Jul 2 07:57:12.180000 audit[4798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003600d8 items=0 ppid=4501 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:12.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734366164653932363163363731393466313138353033626438616162 Jul 2 07:57:12.205000 audit: BPF prog-id=188 op=UNLOAD Jul 2 07:57:12.205000 audit: BPF prog-id=187 op=UNLOAD Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { perfmon } for pid=4798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit[4798]: AVC avc: denied { bpf } for pid=4798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:12.205000 audit: BPF prog-id=189 op=LOAD Jul 2 07:57:12.205000 audit[4798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003604e8 items=0 ppid=4501 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734366164653932363163363731393466313138353033626438616162 Jul 2 07:57:12.294915 env[1438]: time="2024-07-02T07:57:12.294838595Z" level=info msg="StartContainer for \"746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444\" returns successfully" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.193 [WARNING][4832] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b5297c82-2d64-4187-bb29-5c66a9920b0d", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6", Pod:"coredns-5dd5756b68-nr8cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7519a63b342", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.193 [INFO][4832] k8s.go 608: Cleaning up netns ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.193 [INFO][4832] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" iface="eth0" netns="" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.193 [INFO][4832] k8s.go 615: Releasing IP address(es) ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.193 [INFO][4832] utils.go 188: Calico CNI releasing IP address ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.305 [INFO][4839] ipam_plugin.go 411: Releasing address using handleID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.306 [INFO][4839] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.306 [INFO][4839] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.313 [WARNING][4839] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.313 [INFO][4839] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.315 [INFO][4839] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:12.321862 env[1438]: 2024-07-02 07:57:12.317 [INFO][4832] k8s.go 621: Teardown processing complete. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.322900 env[1438]: time="2024-07-02T07:57:12.322835678Z" level=info msg="TearDown network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" successfully" Jul 2 07:57:12.323054 env[1438]: time="2024-07-02T07:57:12.323032179Z" level=info msg="StopPodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" returns successfully" Jul 2 07:57:12.323928 env[1438]: time="2024-07-02T07:57:12.323880185Z" level=info msg="RemovePodSandbox for \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" Jul 2 07:57:12.324130 env[1438]: time="2024-07-02T07:57:12.324073286Z" level=info msg="Forcibly stopping sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\"" Jul 2 07:57:12.409831 kubelet[2596]: I0702 07:57:12.408346 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79ffdc4fbf-dl76k" podStartSLOduration=38.334722589 podCreationTimestamp="2024-07-02 07:56:29 +0000 UTC" firstStartedPulling="2024-07-02 07:57:06.861179091 +0000 UTC m=+55.909069510" lastFinishedPulling="2024-07-02 07:57:11.934736239 +0000 UTC m=+60.982626658" observedRunningTime="2024-07-02 07:57:12.407959635 +0000 UTC m=+61.455850154" watchObservedRunningTime="2024-07-02 07:57:12.408279737 +0000 UTC m=+61.456170256" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.440 [WARNING][4867] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b5297c82-2d64-4187-bb29-5c66a9920b0d", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"217c8b08087b68836e0a9402826b76c9faa3dd5a73ce38a7c4c16cea4a0106f6", Pod:"coredns-5dd5756b68-nr8cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7519a63b342", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.440 [INFO][4867] k8s.go 608: Cleaning up netns ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.440 [INFO][4867] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" iface="eth0" netns="" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.440 [INFO][4867] k8s.go 615: Releasing IP address(es) ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.440 [INFO][4867] utils.go 188: Calico CNI releasing IP address ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.486 [INFO][4889] ipam_plugin.go 411: Releasing address using handleID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.486 [INFO][4889] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.486 [INFO][4889] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.495 [WARNING][4889] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.495 [INFO][4889] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" HandleID="k8s-pod-network.b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Workload="ci--3510.3.5--a--195c2606d4-k8s-coredns--5dd5756b68--nr8cz-eth0" Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.497 [INFO][4889] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:12.500496 env[1438]: 2024-07-02 07:57:12.499 [INFO][4867] k8s.go 621: Teardown processing complete. ContainerID="b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638" Jul 2 07:57:12.501333 env[1438]: time="2024-07-02T07:57:12.500551340Z" level=info msg="TearDown network for sandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" successfully" Jul 2 07:57:12.513428 env[1438]: time="2024-07-02T07:57:12.513331623Z" level=info msg="RemovePodSandbox \"b355b77381990880048a226605a9def0c1a4f188347d006db6300fa805a0b638\" returns successfully" Jul 2 07:57:12.514446 env[1438]: time="2024-07-02T07:57:12.514166929Z" level=info msg="StopPodSandbox for \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\"" Jul 2 07:57:12.514446 env[1438]: time="2024-07-02T07:57:12.514296330Z" level=info msg="TearDown network for sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" successfully" Jul 2 07:57:12.514446 env[1438]: time="2024-07-02T07:57:12.514352730Z" level=info msg="StopPodSandbox for \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" returns successfully" Jul 2 07:57:12.515143 env[1438]: time="2024-07-02T07:57:12.515109535Z" level=info msg="RemovePodSandbox for \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\"" Jul 2 07:57:12.515233 env[1438]: time="2024-07-02T07:57:12.515156835Z" level=info msg="Forcibly stopping sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\"" Jul 2 07:57:12.515296 env[1438]: time="2024-07-02T07:57:12.515262736Z" level=info msg="TearDown network for sandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" successfully" Jul 2 07:57:12.524641 env[1438]: time="2024-07-02T07:57:12.524554997Z" level=info msg="RemovePodSandbox \"068b46d8ea65e212ad8d60e6ba393d8a259644afaf6b21706eebf25e5b6819f4\" returns successfully" Jul 2 07:57:13.854493 env[1438]: time="2024-07-02T07:57:13.854423366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:13.863537 env[1438]: time="2024-07-02T07:57:13.863391624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:13.869106 env[1438]: time="2024-07-02T07:57:13.869054461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:13.875562 env[1438]: time="2024-07-02T07:57:13.875509903Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:13.876075 env[1438]: time="2024-07-02T07:57:13.876039106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:57:13.879311 env[1438]: time="2024-07-02T07:57:13.878791624Z" level=info msg="CreateContainer within sandbox \"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:57:13.913782 env[1438]: time="2024-07-02T07:57:13.913721352Z" level=info msg="CreateContainer within sandbox \"046accef7b2cedb047bf7b9f94104564e635e02e900642fd98cd637f3f28db00\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6b8d7fc095e075a5a458a906633bfeacecc4f1f4d701502c312264105bde161c\"" Jul 2 07:57:13.916292 env[1438]: time="2024-07-02T07:57:13.914747858Z" level=info msg="StartContainer for \"6b8d7fc095e075a5a458a906633bfeacecc4f1f4d701502c312264105bde161c\"" Jul 2 07:57:13.948525 systemd[1]: Started cri-containerd-6b8d7fc095e075a5a458a906633bfeacecc4f1f4d701502c312264105bde161c.scope. Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f598066cd48 items=0 ppid=4540 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:13.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662386437666330393565303735613561343538613930363633336266 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit: BPF prog-id=190 op=LOAD Jul 2 07:57:13.971000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4c58 items=0 ppid=4540 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:13.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662386437666330393565303735613561343538613930363633336266 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit: BPF prog-id=191 op=LOAD Jul 2 07:57:13.971000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4ca8 items=0 ppid=4540 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:13.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662386437666330393565303735613561343538613930363633336266 Jul 2 07:57:13.971000 audit: BPF prog-id=191 op=UNLOAD Jul 2 07:57:13.971000 audit: BPF prog-id=190 op=UNLOAD Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:13.971000 audit: BPF prog-id=192 op=LOAD Jul 2 07:57:13.971000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4d38 items=0 ppid=4540 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:13.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662386437666330393565303735613561343538613930363633336266 Jul 2 07:57:13.994526 env[1438]: time="2024-07-02T07:57:13.994471577Z" level=info msg="StartContainer for \"6b8d7fc095e075a5a458a906633bfeacecc4f1f4d701502c312264105bde161c\" returns successfully" Jul 2 07:57:14.230859 kubelet[2596]: I0702 07:57:14.230820 2596 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:57:14.230859 kubelet[2596]: I0702 07:57:14.230860 2596 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:57:14.391301 kubelet[2596]: I0702 07:57:14.391256 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-h8rtq" podStartSLOduration=39.366677369 podCreationTimestamp="2024-07-02 07:56:28 +0000 UTC" firstStartedPulling="2024-07-02 07:57:06.852219931 +0000 UTC m=+55.900110350" lastFinishedPulling="2024-07-02 07:57:13.876745311 +0000 UTC m=+62.924635830" observedRunningTime="2024-07-02 07:57:14.38993174 +0000 UTC m=+63.437822159" watchObservedRunningTime="2024-07-02 07:57:14.391202849 +0000 UTC m=+63.439093368" Jul 2 07:57:16.809764 systemd[1]: run-containerd-runc-k8s.io-746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444-runc.5UJ4Pf.mount: Deactivated successfully. Jul 2 07:57:22.800267 kubelet[2596]: I0702 07:57:22.800225 2596 topology_manager.go:215] "Topology Admit Handler" podUID="49a056ad-5fe8-445f-be01-104a0be2c8d7" podNamespace="calico-apiserver" podName="calico-apiserver-84dd9b499b-7hhfm" Jul 2 07:57:22.808695 systemd[1]: Created slice kubepods-besteffort-pod49a056ad_5fe8_445f_be01_104a0be2c8d7.slice. Jul 2 07:57:22.829294 kubelet[2596]: I0702 07:57:22.829248 2596 topology_manager.go:215] "Topology Admit Handler" podUID="1cac0469-973a-4cff-8b09-474f299f733a" podNamespace="calico-apiserver" podName="calico-apiserver-84dd9b499b-jb4pr" Jul 2 07:57:22.837738 systemd[1]: Created slice kubepods-besteffort-pod1cac0469_973a_4cff_8b09_474f299f733a.slice. Jul 2 07:57:22.849890 kernel: kauditd_printk_skb: 90 callbacks suppressed Jul 2 07:57:22.850038 kernel: audit: type=1325 audit(1719907042.838:1164): table=filter:123 family=2 entries=9 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.838000 audit[5001]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.838000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca55caf30 a2=0 a3=7ffca55caf1c items=0 ppid=2730 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.878837 kernel: audit: type=1300 audit(1719907042.838:1164): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca55caf30 a2=0 a3=7ffca55caf1c items=0 ppid=2730 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:22.892830 kernel: audit: type=1327 audit(1719907042.838:1164): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:22.879000 audit[5001]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.879000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca55caf30 a2=0 a3=7ffca55caf1c items=0 ppid=2730 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.935545 kernel: audit: type=1325 audit(1719907042.879:1165): table=nat:124 family=2 entries=20 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.935729 kernel: audit: type=1300 audit(1719907042.879:1165): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca55caf30 a2=0 a3=7ffca55caf1c items=0 ppid=2730 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.942250 kernel: audit: type=1327 audit(1719907042.879:1165): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:22.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:22.945213 kubelet[2596]: I0702 07:57:22.935959 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-22brz\" (UniqueName: \"kubernetes.io/projected/49a056ad-5fe8-445f-be01-104a0be2c8d7-kube-api-access-22brz\") pod \"calico-apiserver-84dd9b499b-7hhfm\" (UID: \"49a056ad-5fe8-445f-be01-104a0be2c8d7\") " pod="calico-apiserver/calico-apiserver-84dd9b499b-7hhfm" Jul 2 07:57:22.945213 kubelet[2596]: I0702 07:57:22.936008 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1cac0469-973a-4cff-8b09-474f299f733a-calico-apiserver-certs\") pod \"calico-apiserver-84dd9b499b-jb4pr\" (UID: \"1cac0469-973a-4cff-8b09-474f299f733a\") " pod="calico-apiserver/calico-apiserver-84dd9b499b-jb4pr" Jul 2 07:57:22.945213 kubelet[2596]: I0702 07:57:22.936043 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/49a056ad-5fe8-445f-be01-104a0be2c8d7-calico-apiserver-certs\") pod \"calico-apiserver-84dd9b499b-7hhfm\" (UID: \"49a056ad-5fe8-445f-be01-104a0be2c8d7\") " pod="calico-apiserver/calico-apiserver-84dd9b499b-7hhfm" Jul 2 07:57:22.945213 kubelet[2596]: I0702 07:57:22.936068 2596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-549mx\" (UniqueName: \"kubernetes.io/projected/1cac0469-973a-4cff-8b09-474f299f733a-kube-api-access-549mx\") pod \"calico-apiserver-84dd9b499b-jb4pr\" (UID: \"1cac0469-973a-4cff-8b09-474f299f733a\") " pod="calico-apiserver/calico-apiserver-84dd9b499b-jb4pr" Jul 2 07:57:22.926000 audit[5004]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.926000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff08873770 a2=0 a3=7fff0887375c items=0 ppid=2730 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:23.003298 kernel: audit: type=1325 audit(1719907042.926:1166): table=filter:125 family=2 entries=10 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:23.003457 kernel: audit: type=1300 audit(1719907042.926:1166): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff08873770 a2=0 a3=7fff0887375c items=0 ppid=2730 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:23.019377 kernel: audit: type=1327 audit(1719907042.926:1166): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:22.926000 audit[5004]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:23.042771 kubelet[2596]: E0702 07:57:23.037351 2596 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:57:23.042771 kubelet[2596]: E0702 07:57:23.037491 2596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/49a056ad-5fe8-445f-be01-104a0be2c8d7-calico-apiserver-certs podName:49a056ad-5fe8-445f-be01-104a0be2c8d7 nodeName:}" failed. No retries permitted until 2024-07-02 07:57:23.537447399 +0000 UTC m=+72.585337918 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/49a056ad-5fe8-445f-be01-104a0be2c8d7-calico-apiserver-certs") pod "calico-apiserver-84dd9b499b-7hhfm" (UID: "49a056ad-5fe8-445f-be01-104a0be2c8d7") : secret "calico-apiserver-certs" not found Jul 2 07:57:23.043826 kubelet[2596]: E0702 07:57:23.043698 2596 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:57:23.043826 kubelet[2596]: E0702 07:57:23.043780 2596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/1cac0469-973a-4cff-8b09-474f299f733a-calico-apiserver-certs podName:1cac0469-973a-4cff-8b09-474f299f733a nodeName:}" failed. No retries permitted until 2024-07-02 07:57:23.543757673 +0000 UTC m=+72.591648192 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/1cac0469-973a-4cff-8b09-474f299f733a-calico-apiserver-certs") pod "calico-apiserver-84dd9b499b-jb4pr" (UID: "1cac0469-973a-4cff-8b09-474f299f733a") : secret "calico-apiserver-certs" not found Jul 2 07:57:23.046827 kernel: audit: type=1325 audit(1719907042.926:1167): table=nat:126 family=2 entries=20 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:22.926000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff08873770 a2=0 a3=7fff0887375c items=0 ppid=2730 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:22.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:23.720903 env[1438]: time="2024-07-02T07:57:23.720840943Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84dd9b499b-7hhfm,Uid:49a056ad-5fe8-445f-be01-104a0be2c8d7,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:57:23.743509 env[1438]: time="2024-07-02T07:57:23.743458575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84dd9b499b-jb4pr,Uid:1cac0469-973a-4cff-8b09-474f299f733a,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:57:23.954714 systemd-networkd[1587]: cali27b3a5c833d: Link UP Jul 2 07:57:23.975374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:23.975537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali27b3a5c833d: link becomes ready Jul 2 07:57:23.978217 systemd-networkd[1587]: cali27b3a5c833d: Gained carrier Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.833 [INFO][5011] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0 calico-apiserver-84dd9b499b- calico-apiserver 49a056ad-5fe8-445f-be01-104a0be2c8d7 968 0 2024-07-02 07:57:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84dd9b499b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 calico-apiserver-84dd9b499b-7hhfm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali27b3a5c833d [] []}} ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.833 [INFO][5011] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.891 [INFO][5032] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" HandleID="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.905 [INFO][5032] ipam_plugin.go 264: Auto assigning IP ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" HandleID="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f7cc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-195c2606d4", "pod":"calico-apiserver-84dd9b499b-7hhfm", "timestamp":"2024-07-02 07:57:23.89173521 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.905 [INFO][5032] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.905 [INFO][5032] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.905 [INFO][5032] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.908 [INFO][5032] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.921 [INFO][5032] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.926 [INFO][5032] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.930 [INFO][5032] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.932 [INFO][5032] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.932 [INFO][5032] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.934 [INFO][5032] ipam.go 1685: Creating new handle: k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3 Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.938 [INFO][5032] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.945 [INFO][5032] ipam.go 1216: Successfully claimed IPs: [192.168.56.5/26] block=192.168.56.0/26 handle="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.945 [INFO][5032] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.5/26] handle="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.945 [INFO][5032] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:24.047828 env[1438]: 2024-07-02 07:57:23.945 [INFO][5032] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.5/26] IPv6=[] ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" HandleID="k8s-pod-network.c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:23.947 [INFO][5011] k8s.go 386: Populated endpoint ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0", GenerateName:"calico-apiserver-84dd9b499b-", Namespace:"calico-apiserver", SelfLink:"", UID:"49a056ad-5fe8-445f-be01-104a0be2c8d7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84dd9b499b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"calico-apiserver-84dd9b499b-7hhfm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali27b3a5c833d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:23.947 [INFO][5011] k8s.go 387: Calico CNI using IPs: [192.168.56.5/32] ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:23.947 [INFO][5011] dataplane_linux.go 68: Setting the host side veth name to cali27b3a5c833d ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:23.992 [INFO][5011] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:23.993 [INFO][5011] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0", GenerateName:"calico-apiserver-84dd9b499b-", Namespace:"calico-apiserver", SelfLink:"", UID:"49a056ad-5fe8-445f-be01-104a0be2c8d7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84dd9b499b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3", Pod:"calico-apiserver-84dd9b499b-7hhfm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali27b3a5c833d", MAC:"1a:55:cb:c6:7f:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:24.048936 env[1438]: 2024-07-02 07:57:24.046 [INFO][5011] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-7hhfm" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--7hhfm-eth0" Jul 2 07:57:24.101122 env[1438]: time="2024-07-02T07:57:24.100450534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:24.101122 env[1438]: time="2024-07-02T07:57:24.100607555Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:24.101122 env[1438]: time="2024-07-02T07:57:24.100713270Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:24.102234 env[1438]: time="2024-07-02T07:57:24.102135164Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3 pid=5069 runtime=io.containerd.runc.v2 Jul 2 07:57:24.155018 systemd[1]: run-containerd-runc-k8s.io-c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3-runc.2S7SN4.mount: Deactivated successfully. Jul 2 07:57:24.165142 systemd[1]: Started cri-containerd-c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3.scope. Jul 2 07:57:24.228536 systemd-networkd[1587]: calieaa03a31b51: Link UP Jul 2 07:57:24.234829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieaa03a31b51: link becomes ready Jul 2 07:57:24.236715 systemd-networkd[1587]: calieaa03a31b51: Gained carrier Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.870 [INFO][5020] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0 calico-apiserver-84dd9b499b- calico-apiserver 1cac0469-973a-4cff-8b09-474f299f733a 971 0 2024-07-02 07:57:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84dd9b499b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-195c2606d4 calico-apiserver-84dd9b499b-jb4pr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calieaa03a31b51 [] []}} ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.870 [INFO][5020] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.940 [INFO][5038] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" HandleID="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.959 [INFO][5038] ipam_plugin.go 264: Auto assigning IP ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" HandleID="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f1cc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-195c2606d4", "pod":"calico-apiserver-84dd9b499b-jb4pr", "timestamp":"2024-07-02 07:57:23.94039805 +0000 UTC"}, Hostname:"ci-3510.3.5-a-195c2606d4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.960 [INFO][5038] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.960 [INFO][5038] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.960 [INFO][5038] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-195c2606d4' Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:23.962 [INFO][5038] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.000 [INFO][5038] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.083 [INFO][5038] ipam.go 489: Trying affinity for 192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.128 [INFO][5038] ipam.go 155: Attempting to load block cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.183 [INFO][5038] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.56.0/26 host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.183 [INFO][5038] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.56.0/26 handle="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.185 [INFO][5038] ipam.go 1685: Creating new handle: k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24 Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.190 [INFO][5038] ipam.go 1203: Writing block in order to claim IPs block=192.168.56.0/26 handle="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.213 [INFO][5038] ipam.go 1216: Successfully claimed IPs: [192.168.56.6/26] block=192.168.56.0/26 handle="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.213 [INFO][5038] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.56.6/26] handle="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" host="ci-3510.3.5-a-195c2606d4" Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.213 [INFO][5038] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:24.262908 env[1438]: 2024-07-02 07:57:24.213 [INFO][5038] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.56.6/26] IPv6=[] ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" HandleID="k8s-pod-network.f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Workload="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.215 [INFO][5020] k8s.go 386: Populated endpoint ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0", GenerateName:"calico-apiserver-84dd9b499b-", Namespace:"calico-apiserver", SelfLink:"", UID:"1cac0469-973a-4cff-8b09-474f299f733a", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84dd9b499b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"", Pod:"calico-apiserver-84dd9b499b-jb4pr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieaa03a31b51", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.215 [INFO][5020] k8s.go 387: Calico CNI using IPs: [192.168.56.6/32] ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.215 [INFO][5020] dataplane_linux.go 68: Setting the host side veth name to calieaa03a31b51 ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.236 [INFO][5020] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.237 [INFO][5020] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0", GenerateName:"calico-apiserver-84dd9b499b-", Namespace:"calico-apiserver", SelfLink:"", UID:"1cac0469-973a-4cff-8b09-474f299f733a", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84dd9b499b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-195c2606d4", ContainerID:"f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24", Pod:"calico-apiserver-84dd9b499b-jb4pr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieaa03a31b51", MAC:"56:3b:84:27:df:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:24.263938 env[1438]: 2024-07-02 07:57:24.260 [INFO][5020] k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24" Namespace="calico-apiserver" Pod="calico-apiserver-84dd9b499b-jb4pr" WorkloadEndpoint="ci--3510.3.5--a--195c2606d4-k8s-calico--apiserver--84dd9b499b--jb4pr-eth0" Jul 2 07:57:24.287822 env[1438]: time="2024-07-02T07:57:24.287733029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:24.288038 env[1438]: time="2024-07-02T07:57:24.287844044Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:24.288038 env[1438]: time="2024-07-02T07:57:24.287874348Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:24.288149 env[1438]: time="2024-07-02T07:57:24.288060374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24 pid=5117 runtime=io.containerd.runc.v2 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.302000 audit: BPF prog-id=193 op=LOAD Jul 2 07:57:24.303000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.303000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5069 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356564363430663437326436356132343937306663363834346639 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5069 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356564363430663437326436356132343937306663363834346639 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.304000 audit: BPF prog-id=194 op=LOAD Jul 2 07:57:24.304000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003950b0 items=0 ppid=5069 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356564363430663437326436356132343937306663363834346639 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.305000 audit: BPF prog-id=195 op=LOAD Jul 2 07:57:24.305000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003950f8 items=0 ppid=5069 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356564363430663437326436356132343937306663363834346639 Jul 2 07:57:24.307000 audit: BPF prog-id=195 op=UNLOAD Jul 2 07:57:24.307000 audit: BPF prog-id=194 op=UNLOAD Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.307000 audit: BPF prog-id=196 op=LOAD Jul 2 07:57:24.307000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000395508 items=0 ppid=5069 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356564363430663437326436356132343937306663363834346639 Jul 2 07:57:24.318031 systemd[1]: Started cri-containerd-f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24.scope. Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.367000 audit: BPF prog-id=197 op=LOAD Jul 2 07:57:24.369000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.369000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5117 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643831663833316464633363646564323133343161653364323463 Jul 2 07:57:24.369000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.369000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5117 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643831663833316464633363646564323133343161653364323463 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit: BPF prog-id=198 op=LOAD Jul 2 07:57:24.370000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023f740 items=0 ppid=5117 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643831663833316464633363646564323133343161653364323463 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.370000 audit: BPF prog-id=199 op=LOAD Jul 2 07:57:24.370000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023f788 items=0 ppid=5117 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643831663833316464633363646564323133343161653364323463 Jul 2 07:57:24.371000 audit: BPF prog-id=199 op=UNLOAD Jul 2 07:57:24.372000 audit: BPF prog-id=198 op=UNLOAD Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:24.373000 audit: BPF prog-id=200 op=LOAD Jul 2 07:57:24.373000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023fb98 items=0 ppid=5117 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643831663833316464633363646564323133343161653364323463 Jul 2 07:57:24.385000 audit[5144]: NETFILTER_CFG table=filter:127 family=2 entries=55 op=nft_register_chain pid=5144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:24.385000 audit[5144]: SYSCALL arch=c000003e syscall=46 success=yes exit=27464 a0=3 a1=7ffd8e52fd20 a2=0 a3=7ffd8e52fd0c items=0 ppid=3938 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.385000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:24.414245 env[1438]: time="2024-07-02T07:57:24.414192812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84dd9b499b-7hhfm,Uid:49a056ad-5fe8-445f-be01-104a0be2c8d7,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3\"" Jul 2 07:57:24.417333 env[1438]: time="2024-07-02T07:57:24.417288835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:57:24.429964 env[1438]: time="2024-07-02T07:57:24.429904159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84dd9b499b-jb4pr,Uid:1cac0469-973a-4cff-8b09-474f299f733a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24\"" Jul 2 07:57:24.443000 audit[5158]: NETFILTER_CFG table=filter:128 family=2 entries=49 op=nft_register_chain pid=5158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:24.443000 audit[5158]: SYSCALL arch=c000003e syscall=46 success=yes exit=24300 a0=3 a1=7ffe94df6570 a2=0 a3=7ffe94df655c items=0 ppid=3938 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:24.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:25.354047 systemd-networkd[1587]: cali27b3a5c833d: Gained IPv6LL Jul 2 07:57:25.674055 systemd-networkd[1587]: calieaa03a31b51: Gained IPv6LL Jul 2 07:57:27.563673 env[1438]: time="2024-07-02T07:57:27.563615187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.571953 env[1438]: time="2024-07-02T07:57:27.571891274Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.578934 env[1438]: time="2024-07-02T07:57:27.578881792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.582524 env[1438]: time="2024-07-02T07:57:27.582478565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.583017 env[1438]: time="2024-07-02T07:57:27.582975330Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:57:27.584535 env[1438]: time="2024-07-02T07:57:27.584494729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:57:27.586127 env[1438]: time="2024-07-02T07:57:27.586088839Z" level=info msg="CreateContainer within sandbox \"c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:57:27.623042 env[1438]: time="2024-07-02T07:57:27.622983085Z" level=info msg="CreateContainer within sandbox \"c35ed640f472d65a24970fc6844f99a35ee7cfe9d1749b9d583bd248d7ebd7a3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b392ccfdeb76faf9b0518f5f29251beb02a3f735d2af6b68aef0a56fc34aa457\"" Jul 2 07:57:27.624023 env[1438]: time="2024-07-02T07:57:27.623982117Z" level=info msg="StartContainer for \"b392ccfdeb76faf9b0518f5f29251beb02a3f735d2af6b68aef0a56fc34aa457\"" Jul 2 07:57:27.662231 systemd[1]: run-containerd-runc-k8s.io-b392ccfdeb76faf9b0518f5f29251beb02a3f735d2af6b68aef0a56fc34aa457-runc.6FVzuZ.mount: Deactivated successfully. Jul 2 07:57:27.669002 systemd[1]: Started cri-containerd-b392ccfdeb76faf9b0518f5f29251beb02a3f735d2af6b68aef0a56fc34aa457.scope. Jul 2 07:57:27.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit: BPF prog-id=201 op=LOAD Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5069 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393263636664656237366661663962303531386635663239323531 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5069 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393263636664656237366661663962303531386635663239323531 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit: BPF prog-id=202 op=LOAD Jul 2 07:57:27.684000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025690 items=0 ppid=5069 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393263636664656237366661663962303531386635663239323531 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.684000 audit: BPF prog-id=203 op=LOAD Jul 2 07:57:27.684000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000256d8 items=0 ppid=5069 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393263636664656237366661663962303531386635663239323531 Jul 2 07:57:27.685000 audit: BPF prog-id=203 op=UNLOAD Jul 2 07:57:27.685000 audit: BPF prog-id=202 op=UNLOAD Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.685000 audit: BPF prog-id=204 op=LOAD Jul 2 07:57:27.685000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025ae8 items=0 ppid=5069 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393263636664656237366661663962303531386635663239323531 Jul 2 07:57:27.723118 env[1438]: time="2024-07-02T07:57:27.723032928Z" level=info msg="StartContainer for \"b392ccfdeb76faf9b0518f5f29251beb02a3f735d2af6b68aef0a56fc34aa457\" returns successfully" Jul 2 07:57:28.063351 env[1438]: time="2024-07-02T07:57:28.063290017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:28.071163 env[1438]: time="2024-07-02T07:57:28.071046823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:28.075690 env[1438]: time="2024-07-02T07:57:28.075641018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:28.082184 env[1438]: time="2024-07-02T07:57:28.082099856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:28.082420 env[1438]: time="2024-07-02T07:57:28.082387093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:57:28.085408 env[1438]: time="2024-07-02T07:57:28.085363779Z" level=info msg="CreateContainer within sandbox \"f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:57:28.127047 env[1438]: time="2024-07-02T07:57:28.126984175Z" level=info msg="CreateContainer within sandbox \"f7d81f831ddc3cded21341ae3d24c8e4c5db6f53a165d0e7482eb65c13742e24\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"351e3eb18468b257fef66df910e701d13ae6d54e9d0f6641c649a48c94ffd49c\"" Jul 2 07:57:28.128129 env[1438]: time="2024-07-02T07:57:28.128088118Z" level=info msg="StartContainer for \"351e3eb18468b257fef66df910e701d13ae6d54e9d0f6641c649a48c94ffd49c\"" Jul 2 07:57:28.152435 systemd[1]: Started cri-containerd-351e3eb18468b257fef66df910e701d13ae6d54e9d0f6641c649a48c94ffd49c.scope. Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.189010 kernel: kauditd_printk_skb: 179 callbacks suppressed Jul 2 07:57:28.189117 kernel: audit: type=1400 audit(1719907048.182:1224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.234690 kernel: audit: type=1400 audit(1719907048.182:1225): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.234902 kernel: audit: type=1400 audit(1719907048.182:1226): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.249914 kernel: audit: type=1400 audit(1719907048.182:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.250056 kernel: audit: type=1400 audit(1719907048.182:1228): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.294831 kernel: audit: type=1400 audit(1719907048.182:1229): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.294984 kernel: audit: type=1400 audit(1719907048.182:1230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.311719 kernel: audit: type=1400 audit(1719907048.182:1231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.326023 kernel: audit: type=1400 audit(1719907048.182:1232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.342824 kernel: audit: type=1400 audit(1719907048.183:1233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.183000 audit: BPF prog-id=205 op=LOAD Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=5117 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335316533656231383436386232353766656636366466393130653730 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=5117 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335316533656231383436386232353766656636366466393130653730 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit: BPF prog-id=206 op=LOAD Jul 2 07:57:28.203000 audit[5203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00029c370 items=0 ppid=5117 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335316533656231383436386232353766656636366466393130653730 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit: BPF prog-id=207 op=LOAD Jul 2 07:57:28.203000 audit[5203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00029c3b8 items=0 ppid=5117 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335316533656231383436386232353766656636366466393130653730 Jul 2 07:57:28.203000 audit: BPF prog-id=207 op=UNLOAD Jul 2 07:57:28.203000 audit: BPF prog-id=206 op=UNLOAD Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { perfmon } for pid=5203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit[5203]: AVC avc: denied { bpf } for pid=5203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.203000 audit: BPF prog-id=208 op=LOAD Jul 2 07:57:28.203000 audit[5203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00029c7c8 items=0 ppid=5117 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335316533656231383436386232353766656636366466393130653730 Jul 2 07:57:28.350000 audit[5175]: AVC avc: denied { watch } for pid=5175 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.3850526301/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c316,c374 tclass=file permissive=0 Jul 2 07:57:28.350000 audit[5175]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db7400 a2=fc6 a3=0 items=0 ppid=5069 pid=5175 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 key=(null) Jul 2 07:57:28.350000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:57:28.383023 env[1438]: time="2024-07-02T07:57:28.382953060Z" level=info msg="StartContainer for \"351e3eb18468b257fef66df910e701d13ae6d54e9d0f6641c649a48c94ffd49c\" returns successfully" Jul 2 07:57:28.454531 kubelet[2596]: I0702 07:57:28.454484 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84dd9b499b-7hhfm" podStartSLOduration=3.287564274 podCreationTimestamp="2024-07-02 07:57:22 +0000 UTC" firstStartedPulling="2024-07-02 07:57:24.416624444 +0000 UTC m=+73.464514963" lastFinishedPulling="2024-07-02 07:57:27.583473595 +0000 UTC m=+76.631364014" observedRunningTime="2024-07-02 07:57:28.438958421 +0000 UTC m=+77.486848940" watchObservedRunningTime="2024-07-02 07:57:28.454413325 +0000 UTC m=+77.502303744" Jul 2 07:57:28.479897 kubelet[2596]: I0702 07:57:28.479854 2596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84dd9b499b-jb4pr" podStartSLOduration=2.828689374 podCreationTimestamp="2024-07-02 07:57:22 +0000 UTC" firstStartedPulling="2024-07-02 07:57:24.431760913 +0000 UTC m=+73.479651332" lastFinishedPulling="2024-07-02 07:57:28.08282865 +0000 UTC m=+77.130719069" observedRunningTime="2024-07-02 07:57:28.456011332 +0000 UTC m=+77.503901751" watchObservedRunningTime="2024-07-02 07:57:28.479757111 +0000 UTC m=+77.527647530" Jul 2 07:57:28.492000 audit[5235]: NETFILTER_CFG table=filter:129 family=2 entries=10 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:28.492000 audit[5235]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe19675790 a2=0 a3=7ffe1967577c items=0 ppid=2730 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:28.504000 audit[5235]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:28.504000 audit[5235]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe19675790 a2=0 a3=7ffe1967577c items=0 ppid=2730 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:28.521000 audit[5237]: NETFILTER_CFG table=filter:131 family=2 entries=9 op=nft_register_rule pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:28.521000 audit[5237]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb3fb39c0 a2=0 a3=7ffcb3fb39ac items=0 ppid=2730 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:28.525000 audit[5237]: NETFILTER_CFG table=nat:132 family=2 entries=27 op=nft_register_chain pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:28.525000 audit[5237]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcb3fb39c0 a2=0 a3=7ffcb3fb39ac items=0 ppid=2730 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:28.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:29.197000 audit[5216]: AVC avc: denied { watch } for pid=5216 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.4150614774/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c501,c867 tclass=file permissive=0 Jul 2 07:57:29.197000 audit[5216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006dd000 a2=fc6 a3=0 items=0 ppid=5117 pid=5216 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 key=(null) Jul 2 07:57:29.197000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:57:29.494000 audit[5242]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=5242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:29.494000 audit[5242]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4a1f35c0 a2=0 a3=7ffe4a1f35ac items=0 ppid=2730 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:29.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:29.497000 audit[5242]: NETFILTER_CFG table=nat:134 family=2 entries=34 op=nft_register_chain pid=5242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:29.497000 audit[5242]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe4a1f35c0 a2=0 a3=7ffe4a1f35ac items=0 ppid=2730 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:29.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:46.810620 systemd[1]: run-containerd-runc-k8s.io-746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444-runc.itxXxG.mount: Deactivated successfully. Jul 2 07:57:48.893432 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.CmugI9.mount: Deactivated successfully. Jul 2 07:58:02.424000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:02.430625 kernel: kauditd_printk_skb: 71 callbacks suppressed Jul 2 07:58:02.432100 kernel: audit: type=1400 audit(1719907082.424:1250): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:02.424000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:02.473914 kernel: audit: type=1400 audit(1719907082.424:1251): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:02.475178 kernel: audit: type=1300 audit(1719907082.424:1251): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00105c640 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:02.424000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00105c640 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:02.424000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:02.424000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001487890 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:02.561938 kernel: audit: type=1327 audit(1719907082.424:1251): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:02.562293 kernel: audit: type=1300 audit(1719907082.424:1250): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001487890 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:02.563760 kernel: audit: type=1327 audit(1719907082.424:1250): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:02.424000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:03.014000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.046206 kernel: audit: type=1400 audit(1719907083.014:1252): avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.046387 kernel: audit: type=1300 audit(1719907083.014:1252): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007282cf0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.014000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007282cf0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.075859 kernel: audit: type=1327 audit(1719907083.014:1252): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.025000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.025000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c002fd69c0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.125044 kernel: audit: type=1400 audit(1719907083.025:1253): avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.030000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.030000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007283020 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.030000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.030000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f228b00 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.030000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6374 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.030000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c002fd6a50 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:03.067000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:03.067000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0082010e0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:58:03.067000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:58:07.488000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.500011 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 07:58:07.501526 kernel: audit: type=1400 audit(1719907087.488:1259): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.488000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.543550 kernel: audit: type=1400 audit(1719907087.488:1258): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.545642 kernel: audit: type=1300 audit(1719907087.488:1259): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b17cc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.488000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b17cc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.599585 kernel: audit: type=1327 audit(1719907087.488:1259): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.602759 kernel: audit: type=1300 audit(1719907087.488:1258): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bec220 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.488000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bec220 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.648362 kernel: audit: type=1327 audit(1719907087.488:1258): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.491000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.491000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c0c140 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.707572 kernel: audit: type=1400 audit(1719907087.491:1260): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.708154 kernel: audit: type=1300 audit(1719907087.491:1260): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c0c140 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.708195 kernel: audit: type=1327 audit(1719907087.491:1260): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.492000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.492000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bec240 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:58:07.759332 kernel: audit: type=1400 audit(1719907087.492:1261): avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:10.940980 update_engine[1426]: I0702 07:58:10.940908 1426 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 07:58:10.940980 update_engine[1426]: I0702 07:58:10.940972 1426 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 07:58:10.942053 update_engine[1426]: I0702 07:58:10.941165 1426 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 07:58:10.942488 update_engine[1426]: I0702 07:58:10.942364 1426 omaha_request_params.cc:62] Current group set to lts Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943222 1426 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943331 1426 update_attempter.cc:643] Scheduling an action processor start. Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943357 1426 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943483 1426 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943763 1426 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943851 1426 omaha_request_action.cc:271] Request: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: Jul 2 07:58:10.944151 update_engine[1426]: I0702 07:58:10.943859 1426 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:10.946180 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 07:58:11.159853 update_engine[1426]: I0702 07:58:11.159781 1426 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:11.160187 update_engine[1426]: I0702 07:58:11.160158 1426 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:11.192117 update_engine[1426]: E0702 07:58:11.191857 1426 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:11.192117 update_engine[1426]: I0702 07:58:11.192005 1426 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 07:58:11.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.4:22-10.200.16.10:59924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.655050 systemd[1]: Started sshd@7-10.200.8.4:22-10.200.16.10:59924.service. Jul 2 07:58:12.310000 audit[5353]: USER_ACCT pid=5353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.313001 sshd[5353]: Accepted publickey for core from 10.200.16.10 port 59924 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:12.313718 sshd[5353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:12.312000 audit[5353]: CRED_ACQ pid=5353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.312000 audit[5353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa21cd8e0 a2=3 a3=0 items=0 ppid=1 pid=5353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:12.326233 systemd-logind[1424]: New session 10 of user core. Jul 2 07:58:12.327322 systemd[1]: Started session-10.scope. Jul 2 07:58:12.333000 audit[5353]: USER_START pid=5353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.335000 audit[5355]: CRED_ACQ pid=5355 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.840924 sshd[5353]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:12.841000 audit[5353]: USER_END pid=5353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.852097 kernel: kauditd_printk_skb: 10 callbacks suppressed Jul 2 07:58:12.852212 kernel: audit: type=1106 audit(1719907092.841:1268): pid=5353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.848444 systemd[1]: sshd@7-10.200.8.4:22-10.200.16.10:59924.service: Deactivated successfully. Jul 2 07:58:12.850147 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:58:12.853946 systemd-logind[1424]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:58:12.857648 systemd-logind[1424]: Removed session 10. Jul 2 07:58:12.882618 kernel: audit: type=1104 audit(1719907092.841:1269): pid=5353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.841000 audit[5353]: CRED_DISP pid=5353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:12.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.4:22-10.200.16.10:59924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:12.929737 kernel: audit: type=1131 audit(1719907092.847:1270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.4:22-10.200.16.10:59924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.4:22-10.200.16.10:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.986151 kernel: audit: type=1130 audit(1719907097.950:1271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.4:22-10.200.16.10:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.951997 systemd[1]: Started sshd@8-10.200.8.4:22-10.200.16.10:59930.service. Jul 2 07:58:18.608000 audit[5390]: USER_ACCT pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.614040 sshd[5390]: Accepted publickey for core from 10.200.16.10 port 59930 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:18.643833 kernel: audit: type=1101 audit(1719907098.608:1272): pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.642000 audit[5390]: CRED_ACQ pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.648205 sshd[5390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:18.660365 systemd[1]: Started session-11.scope. Jul 2 07:58:18.668130 systemd-logind[1424]: New session 11 of user core. Jul 2 07:58:18.693055 kernel: audit: type=1103 audit(1719907098.642:1273): pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.693246 kernel: audit: type=1006 audit(1719907098.644:1274): pid=5390 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 07:58:18.694035 kernel: audit: type=1300 audit(1719907098.644:1274): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc10c84400 a2=3 a3=0 items=0 ppid=1 pid=5390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:18.644000 audit[5390]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc10c84400 a2=3 a3=0 items=0 ppid=1 pid=5390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:18.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:18.727135 kernel: audit: type=1327 audit(1719907098.644:1274): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:18.728898 kernel: audit: type=1105 audit(1719907098.673:1275): pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.673000 audit[5390]: USER_START pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.681000 audit[5392]: CRED_ACQ pid=5392 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.775742 kernel: audit: type=1103 audit(1719907098.681:1276): pid=5392 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:18.892289 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.FvnmAZ.mount: Deactivated successfully. Jul 2 07:58:19.146119 sshd[5390]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:19.147000 audit[5390]: USER_END pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:19.150215 systemd[1]: sshd@8-10.200.8.4:22-10.200.16.10:59930.service: Deactivated successfully. Jul 2 07:58:19.151109 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:58:19.152511 systemd-logind[1424]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:58:19.153494 systemd-logind[1424]: Removed session 11. Jul 2 07:58:19.170917 kernel: audit: type=1106 audit(1719907099.147:1277): pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:19.147000 audit[5390]: CRED_DISP pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:19.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.4:22-10.200.16.10:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:19.193835 kernel: audit: type=1104 audit(1719907099.147:1278): pid=5390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:21.910871 update_engine[1426]: I0702 07:58:21.910792 1426 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:21.911363 update_engine[1426]: I0702 07:58:21.911129 1426 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:21.913282 update_engine[1426]: I0702 07:58:21.911438 1426 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:21.981666 update_engine[1426]: E0702 07:58:21.981607 1426 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:21.981915 update_engine[1426]: I0702 07:58:21.981767 1426 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 07:58:24.293719 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:24.293948 kernel: audit: type=1130 audit(1719907104.255:1280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.256337 systemd[1]: Started sshd@9-10.200.8.4:22-10.200.16.10:42110.service. Jul 2 07:58:24.912000 audit[5431]: USER_ACCT pid=5431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.942684 sshd[5431]: Accepted publickey for core from 10.200.16.10 port 42110 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:24.943435 kernel: audit: type=1101 audit(1719907104.912:1281): pid=5431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.943678 sshd[5431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:24.942000 audit[5431]: CRED_ACQ pid=5431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.963416 systemd-logind[1424]: New session 12 of user core. Jul 2 07:58:24.965780 systemd[1]: Started session-12.scope. Jul 2 07:58:24.985129 kernel: audit: type=1103 audit(1719907104.942:1282): pid=5431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.986967 kernel: audit: type=1006 audit(1719907104.942:1283): pid=5431 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 07:58:24.942000 audit[5431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc3575620 a2=3 a3=0 items=0 ppid=1 pid=5431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.999571 kernel: audit: type=1300 audit(1719907104.942:1283): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc3575620 a2=3 a3=0 items=0 ppid=1 pid=5431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.018885 kernel: audit: type=1327 audit(1719907104.942:1283): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:24.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:24.978000 audit[5431]: USER_START pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.980000 audit[5433]: CRED_ACQ pid=5433 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.047132 kernel: audit: type=1105 audit(1719907104.978:1284): pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.047167 kernel: audit: type=1103 audit(1719907104.980:1285): pid=5433 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.470609 sshd[5431]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:25.471000 audit[5431]: USER_END pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.474988 systemd-logind[1424]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:58:25.481424 systemd[1]: sshd@9-10.200.8.4:22-10.200.16.10:42110.service: Deactivated successfully. Jul 2 07:58:25.483489 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:58:25.485670 systemd-logind[1424]: Removed session 12. Jul 2 07:58:25.508832 kernel: audit: type=1106 audit(1719907105.471:1286): pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.472000 audit[5431]: CRED_DISP pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.542837 kernel: audit: type=1104 audit(1719907105.472:1287): pid=5431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:28.350000 audit[5175]: AVC avc: denied { watch } for pid=5175 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.3850526301/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c316,c374 tclass=file permissive=0 Jul 2 07:58:28.350000 audit[5175]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ac0960 a2=fc6 a3=0 items=0 ppid=5069 pid=5175 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 key=(null) Jul 2 07:58:28.350000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:29.198000 audit[5216]: AVC avc: denied { watch } for pid=5216 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.4150614774/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c501,c867 tclass=file permissive=0 Jul 2 07:58:29.198000 audit[5216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000be4000 a2=fc6 a3=0 items=0 ppid=5117 pid=5216 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 key=(null) Jul 2 07:58:29.198000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:30.583891 systemd[1]: Started sshd@10-10.200.8.4:22-10.200.16.10:51008.service. Jul 2 07:58:30.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.4:22-10.200.16.10:51008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:30.592612 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:58:30.592725 kernel: audit: type=1130 audit(1719907110.584:1291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.4:22-10.200.16.10:51008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:31.235000 audit[5448]: USER_ACCT pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.258273 sshd[5448]: Accepted publickey for core from 10.200.16.10 port 51008 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:31.258962 kernel: audit: type=1101 audit(1719907111.235:1292): pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.259316 sshd[5448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:31.256000 audit[5448]: CRED_ACQ pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.266429 systemd[1]: Started session-13.scope. Jul 2 07:58:31.267694 systemd-logind[1424]: New session 13 of user core. Jul 2 07:58:31.280449 kernel: audit: type=1103 audit(1719907111.256:1293): pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.280578 kernel: audit: type=1006 audit(1719907111.258:1294): pid=5448 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 07:58:31.258000 audit[5448]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb642020 a2=3 a3=0 items=0 ppid=1 pid=5448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.291819 kernel: audit: type=1300 audit(1719907111.258:1294): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb642020 a2=3 a3=0 items=0 ppid=1 pid=5448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:31.316989 kernel: audit: type=1327 audit(1719907111.258:1294): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:31.317123 kernel: audit: type=1105 audit(1719907111.274:1295): pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.274000 audit[5448]: USER_START pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.280000 audit[5450]: CRED_ACQ pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.363848 kernel: audit: type=1103 audit(1719907111.280:1296): pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.816940 sshd[5448]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:31.816000 audit[5448]: USER_END pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.820289 systemd[1]: sshd@10-10.200.8.4:22-10.200.16.10:51008.service: Deactivated successfully. Jul 2 07:58:31.821963 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:58:31.845770 systemd-logind[1424]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:58:31.853319 systemd-logind[1424]: Removed session 13. Jul 2 07:58:31.817000 audit[5448]: CRED_DISP pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.861325 kernel: audit: type=1106 audit(1719907111.816:1297): pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.861482 kernel: audit: type=1104 audit(1719907111.817:1298): pid=5448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.4:22-10.200.16.10:51008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:31.908861 update_engine[1426]: I0702 07:58:31.908790 1426 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:31.909394 update_engine[1426]: I0702 07:58:31.909150 1426 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:31.909460 update_engine[1426]: I0702 07:58:31.909441 1426 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:31.928753 systemd[1]: Started sshd@11-10.200.8.4:22-10.200.16.10:51014.service. Jul 2 07:58:31.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.4:22-10.200.16.10:51014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:31.943288 update_engine[1426]: E0702 07:58:31.943121 1426 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:31.943288 update_engine[1426]: I0702 07:58:31.943253 1426 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 07:58:32.573791 sshd[5460]: Accepted publickey for core from 10.200.16.10 port 51014 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:32.571000 audit[5460]: USER_ACCT pid=5460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:32.573000 audit[5460]: CRED_ACQ pid=5460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:32.573000 audit[5460]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1af06bf0 a2=3 a3=0 items=0 ppid=1 pid=5460 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:32.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:32.575731 sshd[5460]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:32.581099 systemd-logind[1424]: New session 14 of user core. Jul 2 07:58:32.581984 systemd[1]: Started session-14.scope. Jul 2 07:58:32.585000 audit[5460]: USER_START pid=5460 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:32.586000 audit[5462]: CRED_ACQ pid=5462 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:33.897372 sshd[5460]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:33.898000 audit[5460]: USER_END pid=5460 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:33.898000 audit[5460]: CRED_DISP pid=5460 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:33.903091 systemd[1]: sshd@11-10.200.8.4:22-10.200.16.10:51014.service: Deactivated successfully. Jul 2 07:58:33.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.4:22-10.200.16.10:51014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:33.904535 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:58:33.905364 systemd-logind[1424]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:58:33.906421 systemd-logind[1424]: Removed session 14. Jul 2 07:58:34.007313 systemd[1]: Started sshd@12-10.200.8.4:22-10.200.16.10:51026.service. Jul 2 07:58:34.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.4:22-10.200.16.10:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:34.649000 audit[5470]: USER_ACCT pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:34.650781 sshd[5470]: Accepted publickey for core from 10.200.16.10 port 51026 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:34.651000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:34.651000 audit[5470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b49a8c0 a2=3 a3=0 items=0 ppid=1 pid=5470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:34.653015 sshd[5470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:34.666164 systemd[1]: Started session-15.scope. Jul 2 07:58:34.666627 systemd-logind[1424]: New session 15 of user core. Jul 2 07:58:34.678000 audit[5470]: USER_START pid=5470 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:34.681000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:35.184086 sshd[5470]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:35.184000 audit[5470]: USER_END pid=5470 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:35.185000 audit[5470]: CRED_DISP pid=5470 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:35.187599 systemd[1]: sshd@12-10.200.8.4:22-10.200.16.10:51026.service: Deactivated successfully. Jul 2 07:58:35.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.4:22-10.200.16.10:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:35.188776 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:58:35.189558 systemd-logind[1424]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:58:35.190551 systemd-logind[1424]: Removed session 15. Jul 2 07:58:40.295123 systemd[1]: Started sshd@13-10.200.8.4:22-10.200.16.10:59346.service. Jul 2 07:58:40.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.4:22-10.200.16.10:59346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:40.316333 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:58:40.316608 kernel: audit: type=1130 audit(1719907120.294:1318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.4:22-10.200.16.10:59346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:40.955000 audit[5503]: USER_ACCT pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:40.957033 sshd[5503]: Accepted publickey for core from 10.200.16.10 port 59346 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:40.985000 audit[5503]: CRED_ACQ pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:40.989255 sshd[5503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:40.996933 systemd[1]: Started session-16.scope. Jul 2 07:58:40.997847 systemd-logind[1424]: New session 16 of user core. Jul 2 07:58:41.023149 kernel: audit: type=1101 audit(1719907120.955:1319): pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.023319 kernel: audit: type=1103 audit(1719907120.985:1320): pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.025902 kernel: audit: type=1006 audit(1719907120.988:1321): pid=5503 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:58:40.988000 audit[5503]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1204fe00 a2=3 a3=0 items=0 ppid=1 pid=5503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:41.081007 kernel: audit: type=1300 audit(1719907120.988:1321): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1204fe00 a2=3 a3=0 items=0 ppid=1 pid=5503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:41.081158 kernel: audit: type=1327 audit(1719907120.988:1321): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:40.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:41.009000 audit[5503]: USER_START pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.126030 kernel: audit: type=1105 audit(1719907121.009:1322): pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.127887 kernel: audit: type=1103 audit(1719907121.017:1323): pid=5505 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.017000 audit[5505]: CRED_ACQ pid=5505 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.498603 sshd[5503]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:41.499000 audit[5503]: USER_END pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.505405 systemd-logind[1424]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:58:41.506829 systemd[1]: sshd@13-10.200.8.4:22-10.200.16.10:59346.service: Deactivated successfully. Jul 2 07:58:41.511747 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:58:41.513639 systemd-logind[1424]: Removed session 16. Jul 2 07:58:41.499000 audit[5503]: CRED_DISP pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.563069 kernel: audit: type=1106 audit(1719907121.499:1324): pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.563266 kernel: audit: type=1104 audit(1719907121.499:1325): pid=5503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:41.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.4:22-10.200.16.10:59346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:41.908878 update_engine[1426]: I0702 07:58:41.908696 1426 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:41.909314 update_engine[1426]: I0702 07:58:41.909035 1426 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:41.909314 update_engine[1426]: I0702 07:58:41.909303 1426 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:41.931480 update_engine[1426]: E0702 07:58:41.931433 1426 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931574 1426 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931587 1426 omaha_request_action.cc:621] Omaha request response: Jul 2 07:58:41.931756 update_engine[1426]: E0702 07:58:41.931699 1426 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931720 1426 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931725 1426 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931730 1426 update_attempter.cc:306] Processing Done. Jul 2 07:58:41.931756 update_engine[1426]: E0702 07:58:41.931747 1426 update_attempter.cc:619] Update failed. Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931753 1426 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 07:58:41.931756 update_engine[1426]: I0702 07:58:41.931758 1426 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 07:58:41.932152 update_engine[1426]: I0702 07:58:41.931763 1426 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 07:58:41.932152 update_engine[1426]: I0702 07:58:41.931887 1426 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:58:41.932152 update_engine[1426]: I0702 07:58:41.931916 1426 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 07:58:41.932152 update_engine[1426]: I0702 07:58:41.931921 1426 omaha_request_action.cc:271] Request: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: Jul 2 07:58:41.932152 update_engine[1426]: I0702 07:58:41.931926 1426 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:41.932521 update_engine[1426]: I0702 07:58:41.932163 1426 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:41.932521 update_engine[1426]: I0702 07:58:41.932364 1426 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:41.932725 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 07:58:41.964525 update_engine[1426]: E0702 07:58:41.964475 1426 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964630 1426 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964641 1426 omaha_request_action.cc:621] Omaha request response: Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964649 1426 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964654 1426 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964658 1426 update_attempter.cc:306] Processing Done. Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964665 1426 update_attempter.cc:310] Error event sent. Jul 2 07:58:41.964744 update_engine[1426]: I0702 07:58:41.964679 1426 update_check_scheduler.cc:74] Next update check in 42m49s Jul 2 07:58:41.965186 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 07:58:46.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.4:22-10.200.16.10:59348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:46.609427 systemd[1]: Started sshd@14-10.200.8.4:22-10.200.16.10:59348.service. Jul 2 07:58:46.645290 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:46.645457 kernel: audit: type=1130 audit(1719907126.608:1327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.4:22-10.200.16.10:59348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:47.285672 sshd[5517]: Accepted publickey for core from 10.200.16.10 port 59348 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:47.284000 audit[5517]: USER_ACCT pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.314969 kernel: audit: type=1101 audit(1719907127.284:1328): pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.315542 sshd[5517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:47.323054 systemd[1]: Started session-17.scope. Jul 2 07:58:47.323458 systemd-logind[1424]: New session 17 of user core. Jul 2 07:58:47.313000 audit[5517]: CRED_ACQ pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.360869 kernel: audit: type=1103 audit(1719907127.313:1329): pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.379103 kernel: audit: type=1006 audit(1719907127.313:1330): pid=5517 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 07:58:47.313000 audit[5517]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1305fb00 a2=3 a3=0 items=0 ppid=1 pid=5517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:47.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:47.405468 kernel: audit: type=1300 audit(1719907127.313:1330): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1305fb00 a2=3 a3=0 items=0 ppid=1 pid=5517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:47.405630 kernel: audit: type=1327 audit(1719907127.313:1330): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:47.405672 kernel: audit: type=1105 audit(1719907127.351:1331): pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.351000 audit[5517]: USER_START pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.372000 audit[5537]: CRED_ACQ pid=5537 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.462850 kernel: audit: type=1103 audit(1719907127.372:1332): pid=5537 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.900664 sshd[5517]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:47.901000 audit[5517]: USER_END pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.916817 systemd[1]: sshd@14-10.200.8.4:22-10.200.16.10:59348.service: Deactivated successfully. Jul 2 07:58:47.917775 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:58:47.919401 systemd-logind[1424]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:58:47.920443 systemd-logind[1424]: Removed session 17. Jul 2 07:58:47.901000 audit[5517]: CRED_DISP pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.945251 kernel: audit: type=1106 audit(1719907127.901:1333): pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.945522 kernel: audit: type=1104 audit(1719907127.901:1334): pid=5517 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:47.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.4:22-10.200.16.10:59348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:48.887021 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.XAyZTW.mount: Deactivated successfully. Jul 2 07:58:53.043856 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:53.044034 kernel: audit: type=1130 audit(1719907133.010:1336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.4:22-10.200.16.10:56056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:53.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.4:22-10.200.16.10:56056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:53.010821 systemd[1]: Started sshd@15-10.200.8.4:22-10.200.16.10:56056.service. Jul 2 07:58:53.681000 audit[5577]: USER_ACCT pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.702716 sshd[5577]: Accepted publickey for core from 10.200.16.10 port 56056 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:53.703129 kernel: audit: type=1101 audit(1719907133.681:1337): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.703255 sshd[5577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:53.701000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.708727 systemd[1]: Started session-18.scope. Jul 2 07:58:53.709717 systemd-logind[1424]: New session 18 of user core. Jul 2 07:58:53.738132 kernel: audit: type=1103 audit(1719907133.701:1338): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.738521 kernel: audit: type=1006 audit(1719907133.701:1339): pid=5577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 07:58:53.740191 kernel: audit: type=1300 audit(1719907133.701:1339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdb15db60 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:53.701000 audit[5577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdb15db60 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:53.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:53.780841 kernel: audit: type=1327 audit(1719907133.701:1339): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:53.780977 kernel: audit: type=1105 audit(1719907133.718:1340): pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.718000 audit[5577]: USER_START pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.720000 audit[5579]: CRED_ACQ pid=5579 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:53.823752 kernel: audit: type=1103 audit(1719907133.720:1341): pid=5579 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.213042 sshd[5577]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:54.214000 audit[5577]: USER_END pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.216932 systemd-logind[1424]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:58:54.218186 systemd[1]: sshd@15-10.200.8.4:22-10.200.16.10:56056.service: Deactivated successfully. Jul 2 07:58:54.219052 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:58:54.220461 systemd-logind[1424]: Removed session 18. Jul 2 07:58:54.214000 audit[5577]: CRED_DISP pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.249770 kernel: audit: type=1106 audit(1719907134.214:1342): pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.249975 kernel: audit: type=1104 audit(1719907134.214:1343): pid=5577 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.4:22-10.200.16.10:56056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:54.321465 systemd[1]: Started sshd@16-10.200.8.4:22-10.200.16.10:56068.service. Jul 2 07:58:54.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.4:22-10.200.16.10:56068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:54.961000 audit[5588]: USER_ACCT pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.962375 sshd[5588]: Accepted publickey for core from 10.200.16.10 port 56068 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:54.962000 audit[5588]: CRED_ACQ pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.964248 sshd[5588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:54.963000 audit[5588]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffab37e100 a2=3 a3=0 items=0 ppid=1 pid=5588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:54.963000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:54.970127 systemd[1]: Started session-19.scope. Jul 2 07:58:54.970607 systemd-logind[1424]: New session 19 of user core. Jul 2 07:58:54.975000 audit[5588]: USER_START pid=5588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:54.976000 audit[5590]: CRED_ACQ pid=5590 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.588235 sshd[5588]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:55.589000 audit[5588]: USER_END pid=5588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.589000 audit[5588]: CRED_DISP pid=5588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.591791 systemd[1]: sshd@16-10.200.8.4:22-10.200.16.10:56068.service: Deactivated successfully. Jul 2 07:58:55.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.4:22-10.200.16.10:56068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:55.593023 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:58:55.594677 systemd-logind[1424]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:58:55.595747 systemd-logind[1424]: Removed session 19. Jul 2 07:58:55.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.4:22-10.200.16.10:56084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:55.704239 systemd[1]: Started sshd@17-10.200.8.4:22-10.200.16.10:56084.service. Jul 2 07:58:56.374041 sshd[5598]: Accepted publickey for core from 10.200.16.10 port 56084 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:56.375852 sshd[5598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:56.373000 audit[5598]: USER_ACCT pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.374000 audit[5598]: CRED_ACQ pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.374000 audit[5598]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff2b869d0 a2=3 a3=0 items=0 ppid=1 pid=5598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:56.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:56.391785 systemd[1]: Started session-20.scope. Jul 2 07:58:56.394490 systemd-logind[1424]: New session 20 of user core. Jul 2 07:58:56.405000 audit[5598]: USER_START pid=5598 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.408000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:57.877000 audit[5610]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:57.877000 audit[5610]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffed31df830 a2=0 a3=7ffed31df81c items=0 ppid=2730 pid=5610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:57.880000 audit[5610]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=5610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:57.880000 audit[5610]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed31df830 a2=0 a3=0 items=0 ppid=2730 pid=5610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:57.900000 audit[5612]: NETFILTER_CFG table=filter:137 family=2 entries=32 op=nft_register_rule pid=5612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:57.900000 audit[5612]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe1f70aac0 a2=0 a3=7ffe1f70aaac items=0 ppid=2730 pid=5612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:57.902000 audit[5612]: NETFILTER_CFG table=nat:138 family=2 entries=22 op=nft_register_rule pid=5612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:57.902000 audit[5612]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe1f70aac0 a2=0 a3=0 items=0 ppid=2730 pid=5612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:57.999885 sshd[5598]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:58.001000 audit[5598]: USER_END pid=5598 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.001000 audit[5598]: CRED_DISP pid=5598 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.004354 systemd[1]: sshd@17-10.200.8.4:22-10.200.16.10:56084.service: Deactivated successfully. Jul 2 07:58:58.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.4:22-10.200.16.10:56084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:58.005507 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:58:58.006387 systemd-logind[1424]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:58:58.007498 systemd-logind[1424]: Removed session 20. Jul 2 07:58:58.109785 systemd[1]: Started sshd@18-10.200.8.4:22-10.200.16.10:56088.service. Jul 2 07:58:58.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.4:22-10.200.16.10:56088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:58.122707 kernel: kauditd_printk_skb: 35 callbacks suppressed Jul 2 07:58:58.122873 kernel: audit: type=1130 audit(1719907138.109:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.4:22-10.200.16.10:56088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:58.753000 audit[5620]: USER_ACCT pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.803950 kernel: audit: type=1101 audit(1719907138.753:1368): pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.804044 kernel: audit: type=1103 audit(1719907138.754:1369): pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.804073 kernel: audit: type=1006 audit(1719907138.754:1370): pid=5620 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 07:58:58.754000 audit[5620]: CRED_ACQ pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.804177 sshd[5620]: Accepted publickey for core from 10.200.16.10 port 56088 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:58.756353 sshd[5620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:58.781271 systemd[1]: Started session-21.scope. Jul 2 07:58:58.782330 systemd-logind[1424]: New session 21 of user core. Jul 2 07:58:58.754000 audit[5620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c0bbd30 a2=3 a3=0 items=0 ppid=1 pid=5620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:58.829351 kernel: audit: type=1300 audit(1719907138.754:1370): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c0bbd30 a2=3 a3=0 items=0 ppid=1 pid=5620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:58.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:58.836490 kernel: audit: type=1327 audit(1719907138.754:1370): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:58.836639 kernel: audit: type=1105 audit(1719907138.797:1371): pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.797000 audit[5620]: USER_START pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.872324 kernel: audit: type=1103 audit(1719907138.800:1372): pid=5623 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:58.800000 audit[5623]: CRED_ACQ pid=5623 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:59.551653 sshd[5620]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:59.552000 audit[5620]: USER_END pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:59.564893 systemd[1]: sshd@18-10.200.8.4:22-10.200.16.10:56088.service: Deactivated successfully. Jul 2 07:58:59.568286 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:58:59.572032 systemd-logind[1424]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:58:59.573208 systemd-logind[1424]: Removed session 21. Jul 2 07:58:59.559000 audit[5620]: CRED_DISP pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:59.612241 kernel: audit: type=1106 audit(1719907139.552:1373): pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:59.612464 kernel: audit: type=1104 audit(1719907139.559:1374): pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:59.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.4:22-10.200.16.10:56088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:59.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.4:22-10.200.16.10:47576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:59.665125 systemd[1]: Started sshd@19-10.200.8.4:22-10.200.16.10:47576.service. Jul 2 07:59:00.322000 audit[5631]: USER_ACCT pid=5631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.323383 sshd[5631]: Accepted publickey for core from 10.200.16.10 port 47576 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:00.323000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.323000 audit[5631]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd69a296e0 a2=3 a3=0 items=0 ppid=1 pid=5631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:00.325139 sshd[5631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:00.330715 systemd[1]: Started session-22.scope. Jul 2 07:59:00.331218 systemd-logind[1424]: New session 22 of user core. Jul 2 07:59:00.335000 audit[5631]: USER_START pid=5631 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.337000 audit[5633]: CRED_ACQ pid=5633 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.846426 sshd[5631]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:00.847000 audit[5631]: USER_END pid=5631 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.847000 audit[5631]: CRED_DISP pid=5631 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:00.850085 systemd[1]: sshd@19-10.200.8.4:22-10.200.16.10:47576.service: Deactivated successfully. Jul 2 07:59:00.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.4:22-10.200.16.10:47576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:00.851789 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:59:00.853790 systemd-logind[1424]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:59:00.855633 systemd-logind[1424]: Removed session 22. Jul 2 07:59:02.425000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:02.425000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:02.425000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d4ad80 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:02.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:02.425000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e03a40 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:02.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:03.017000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.017000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c000c8f200 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.017000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:03.029000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.029000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c002e9cea0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.029000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:03.034000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.034000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.034000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c002e9cf30 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:03.034000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6374 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.034000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c002e9cf90 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:03.034000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007f47de0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:03.068000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:03.068000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0087a79e0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 07:59:03.068000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 07:59:04.648335 kernel: kauditd_printk_skb: 36 callbacks suppressed Jul 2 07:59:04.650532 kernel: audit: type=1325 audit(1719907144.638:1393): table=filter:139 family=2 entries=20 op=nft_register_rule pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:04.638000 audit[5663]: NETFILTER_CFG table=filter:139 family=2 entries=20 op=nft_register_rule pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:04.638000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd213a0230 a2=0 a3=7ffd213a021c items=0 ppid=2730 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.687352 kernel: audit: type=1300 audit(1719907144.638:1393): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd213a0230 a2=0 a3=7ffd213a021c items=0 ppid=2730 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:04.706891 kernel: audit: type=1327 audit(1719907144.638:1393): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:04.645000 audit[5663]: NETFILTER_CFG table=nat:140 family=2 entries=106 op=nft_register_chain pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:04.645000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd213a0230 a2=0 a3=7ffd213a021c items=0 ppid=2730 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.760053 kernel: audit: type=1325 audit(1719907144.645:1394): table=nat:140 family=2 entries=106 op=nft_register_chain pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:04.760269 kernel: audit: type=1300 audit(1719907144.645:1394): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd213a0230 a2=0 a3=7ffd213a021c items=0 ppid=2730 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:04.775829 kernel: audit: type=1327 audit(1719907144.645:1394): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:05.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.4:22-10.200.16.10:47584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:05.959457 systemd[1]: Started sshd@20-10.200.8.4:22-10.200.16.10:47584.service. Jul 2 07:59:05.979020 kernel: audit: type=1130 audit(1719907145.958:1395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.4:22-10.200.16.10:47584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:06.615000 audit[5666]: USER_ACCT pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.641166 sshd[5666]: Accepted publickey for core from 10.200.16.10 port 47584 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:06.641722 sshd[5666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:06.642046 kernel: audit: type=1101 audit(1719907146.615:1396): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.640000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.666804 systemd[1]: Started session-23.scope. Jul 2 07:59:06.671851 systemd-logind[1424]: New session 23 of user core. Jul 2 07:59:06.690116 kernel: audit: type=1103 audit(1719907146.640:1397): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.640000 audit[5666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc8d3bbc0 a2=3 a3=0 items=0 ppid=1 pid=5666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:06.640000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:06.682000 audit[5666]: USER_START pid=5666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.686000 audit[5671]: CRED_ACQ pid=5671 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:06.708846 kernel: audit: type=1006 audit(1719907146.640:1398): pid=5666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 07:59:07.142302 sshd[5666]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:07.144000 audit[5666]: USER_END pid=5666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:07.144000 audit[5666]: CRED_DISP pid=5666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:07.148196 systemd[1]: sshd@20-10.200.8.4:22-10.200.16.10:47584.service: Deactivated successfully. Jul 2 07:59:07.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.4:22-10.200.16.10:47584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:07.150484 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:59:07.152357 systemd-logind[1424]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:59:07.155617 systemd-logind[1424]: Removed session 23. Jul 2 07:59:07.489000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.489000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023b76c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:07.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:07.490000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.490000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288bc60 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:07.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:07.492000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.492000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023b79e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:07.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:07.493000 audit[2456]: AVC avc: denied { watch } for pid=2456 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.493000 audit[2456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288be00 a2=fc6 a3=0 items=0 ppid=2276 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:07.493000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:12.259018 systemd[1]: Started sshd@21-10.200.8.4:22-10.200.16.10:50580.service. Jul 2 07:59:12.301326 kernel: kauditd_printk_skb: 19 callbacks suppressed Jul 2 07:59:12.301494 kernel: audit: type=1130 audit(1719907152.259:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.4:22-10.200.16.10:50580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:12.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.4:22-10.200.16.10:50580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:12.925000 audit[5689]: USER_ACCT pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:12.928055 sshd[5689]: Accepted publickey for core from 10.200.16.10 port 50580 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:12.930074 sshd[5689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:12.946989 kernel: audit: type=1101 audit(1719907152.925:1409): pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:12.927000 audit[5689]: CRED_ACQ pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:12.965643 systemd-logind[1424]: New session 24 of user core. Jul 2 07:59:12.968033 kernel: audit: type=1103 audit(1719907152.927:1410): pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:12.967476 systemd[1]: Started session-24.scope. Jul 2 07:59:12.927000 audit[5689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde8ec5f0 a2=3 a3=0 items=0 ppid=1 pid=5689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:13.003080 kernel: audit: type=1006 audit(1719907152.927:1411): pid=5689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:59:13.003300 kernel: audit: type=1300 audit(1719907152.927:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde8ec5f0 a2=3 a3=0 items=0 ppid=1 pid=5689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:12.972000 audit[5689]: USER_START pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.032853 kernel: audit: type=1327 audit(1719907152.927:1411): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:13.033031 kernel: audit: type=1105 audit(1719907152.972:1412): pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.033078 kernel: audit: type=1103 audit(1719907152.976:1413): pid=5691 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:12.976000 audit[5691]: CRED_ACQ pid=5691 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.472502 sshd[5689]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:13.472000 audit[5689]: USER_END pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.475914 systemd[1]: sshd@21-10.200.8.4:22-10.200.16.10:50580.service: Deactivated successfully. Jul 2 07:59:13.476824 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:59:13.487607 systemd-logind[1424]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:59:13.488743 systemd-logind[1424]: Removed session 24. Jul 2 07:59:13.472000 audit[5689]: CRED_DISP pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.526182 kernel: audit: type=1106 audit(1719907153.472:1414): pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.526413 kernel: audit: type=1104 audit(1719907153.472:1415): pid=5689 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:13.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.4:22-10.200.16.10:50580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:16.805101 systemd[1]: run-containerd-runc-k8s.io-746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444-runc.mWMLDQ.mount: Deactivated successfully. Jul 2 07:59:18.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.4:22-10.200.16.10:48560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:18.584039 systemd[1]: Started sshd@22-10.200.8.4:22-10.200.16.10:48560.service. Jul 2 07:59:18.591438 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:18.592377 kernel: audit: type=1130 audit(1719907158.583:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.4:22-10.200.16.10:48560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:18.884507 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.L7oLT3.mount: Deactivated successfully. Jul 2 07:59:19.249000 audit[5720]: USER_ACCT pid=5720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.271050 kernel: audit: type=1101 audit(1719907159.249:1418): pid=5720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.271111 sshd[5720]: Accepted publickey for core from 10.200.16.10 port 48560 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:19.271535 sshd[5720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:19.270000 audit[5720]: CRED_ACQ pid=5720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.277485 systemd[1]: Started session-25.scope. Jul 2 07:59:19.278610 systemd-logind[1424]: New session 25 of user core. Jul 2 07:59:19.293824 kernel: audit: type=1103 audit(1719907159.270:1419): pid=5720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.293962 kernel: audit: type=1006 audit(1719907159.270:1420): pid=5720 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 07:59:19.270000 audit[5720]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0f418010 a2=3 a3=0 items=0 ppid=1 pid=5720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.325160 kernel: audit: type=1300 audit(1719907159.270:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0f418010 a2=3 a3=0 items=0 ppid=1 pid=5720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.326489 kernel: audit: type=1327 audit(1719907159.270:1420): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:19.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:19.282000 audit[5720]: USER_START pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.359441 kernel: audit: type=1105 audit(1719907159.282:1421): pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.285000 audit[5748]: CRED_ACQ pid=5748 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.384855 kernel: audit: type=1103 audit(1719907159.285:1422): pid=5748 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.775317 sshd[5720]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:19.776000 audit[5720]: USER_END pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.787893 systemd[1]: sshd@22-10.200.8.4:22-10.200.16.10:48560.service: Deactivated successfully. Jul 2 07:59:19.788913 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:59:19.791247 systemd-logind[1424]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:59:19.792489 systemd-logind[1424]: Removed session 25. Jul 2 07:59:19.804376 kernel: audit: type=1106 audit(1719907159.776:1423): pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.776000 audit[5720]: CRED_DISP pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:19.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.4:22-10.200.16.10:48560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:19.820934 kernel: audit: type=1104 audit(1719907159.776:1424): pid=5720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:24.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.4:22-10.200.16.10:48572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:24.890736 systemd[1]: Started sshd@23-10.200.8.4:22-10.200.16.10:48572.service. Jul 2 07:59:24.903081 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:24.903265 kernel: audit: type=1130 audit(1719907164.890:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.4:22-10.200.16.10:48572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:25.561000 audit[5759]: USER_ACCT pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.593341 sshd[5759]: Accepted publickey for core from 10.200.16.10 port 48572 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:25.593871 kernel: audit: type=1101 audit(1719907165.561:1427): pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.594028 sshd[5759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:25.592000 audit[5759]: CRED_ACQ pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.607876 systemd[1]: Started session-26.scope. Jul 2 07:59:25.614251 systemd-logind[1424]: New session 26 of user core. Jul 2 07:59:25.628908 kernel: audit: type=1103 audit(1719907165.592:1428): pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.629022 kernel: audit: type=1006 audit(1719907165.592:1429): pid=5759 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 07:59:25.592000 audit[5759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb74c280 a2=3 a3=0 items=0 ppid=1 pid=5759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:25.641836 kernel: audit: type=1300 audit(1719907165.592:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb74c280 a2=3 a3=0 items=0 ppid=1 pid=5759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:25.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:25.625000 audit[5759]: USER_START pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.700408 kernel: audit: type=1327 audit(1719907165.592:1429): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:25.700597 kernel: audit: type=1105 audit(1719907165.625:1430): pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.628000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:25.719594 kernel: audit: type=1103 audit(1719907165.628:1431): pid=5761 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:26.087426 sshd[5759]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:26.089000 audit[5759]: USER_END pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:26.107634 systemd[1]: sshd@23-10.200.8.4:22-10.200.16.10:48572.service: Deactivated successfully. Jul 2 07:59:26.110259 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:59:26.114445 systemd-logind[1424]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:59:26.117033 systemd-logind[1424]: Removed session 26. Jul 2 07:59:26.132997 kernel: audit: type=1106 audit(1719907166.089:1432): pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:26.105000 audit[5759]: CRED_DISP pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:26.167832 kernel: audit: type=1104 audit(1719907166.105:1433): pid=5759 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:26.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.4:22-10.200.16.10:48572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:28.353000 audit[5175]: AVC avc: denied { watch } for pid=5175 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.3850526301/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c316,c374 tclass=file permissive=0 Jul 2 07:59:28.353000 audit[5175]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015383c0 a2=fc6 a3=0 items=0 ppid=5069 pid=5175 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c374 key=(null) Jul 2 07:59:28.353000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:29.200000 audit[5216]: AVC avc: denied { watch } for pid=5216 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_57_23.4150614774/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c501,c867 tclass=file permissive=0 Jul 2 07:59:29.200000 audit[5216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fce740 a2=fc6 a3=0 items=0 ppid=5117 pid=5216 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c501,c867 key=(null) Jul 2 07:59:29.200000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:31.195820 systemd[1]: Started sshd@24-10.200.8.4:22-10.200.16.10:50438.service. Jul 2 07:59:31.238894 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:59:31.239027 kernel: audit: type=1130 audit(1719907171.195:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.4:22-10.200.16.10:50438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.4:22-10.200.16.10:50438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:31.859000 audit[5779]: USER_ACCT pid=5779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:31.888025 kernel: audit: type=1101 audit(1719907171.859:1438): pid=5779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:31.888085 sshd[5779]: Accepted publickey for core from 10.200.16.10 port 50438 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:31.888590 sshd[5779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:31.887000 audit[5779]: CRED_ACQ pid=5779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:31.897056 systemd[1]: Started session-27.scope. Jul 2 07:59:31.897958 systemd-logind[1424]: New session 27 of user core. Jul 2 07:59:31.947634 kernel: audit: type=1103 audit(1719907171.887:1439): pid=5779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:31.948785 kernel: audit: type=1006 audit(1719907171.887:1440): pid=5779 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 07:59:31.949859 kernel: audit: type=1300 audit(1719907171.887:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56208ea0 a2=3 a3=0 items=0 ppid=1 pid=5779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:31.887000 audit[5779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56208ea0 a2=3 a3=0 items=0 ppid=1 pid=5779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:31.974699 kernel: audit: type=1327 audit(1719907171.887:1440): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:31.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:31.912000 audit[5779]: USER_START pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.016933 kernel: audit: type=1105 audit(1719907171.912:1441): pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:31.915000 audit[5781]: CRED_ACQ pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.051830 kernel: audit: type=1103 audit(1719907171.915:1442): pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.393435 sshd[5779]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:32.394000 audit[5779]: USER_END pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.397724 systemd-logind[1424]: Session 27 logged out. Waiting for processes to exit. Jul 2 07:59:32.399158 systemd[1]: sshd@24-10.200.8.4:22-10.200.16.10:50438.service: Deactivated successfully. Jul 2 07:59:32.400044 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 07:59:32.401899 systemd-logind[1424]: Removed session 27. Jul 2 07:59:32.395000 audit[5779]: CRED_DISP pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.441971 kernel: audit: type=1106 audit(1719907172.394:1443): pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.442464 kernel: audit: type=1104 audit(1719907172.395:1444): pid=5779 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:32.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.4:22-10.200.16.10:50438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:37.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.4:22-10.200.16.10:50442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:37.505925 systemd[1]: Started sshd@25-10.200.8.4:22-10.200.16.10:50442.service. Jul 2 07:59:37.517823 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:37.517895 kernel: audit: type=1130 audit(1719907177.504:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.4:22-10.200.16.10:50442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:38.188000 audit[5792]: USER_ACCT pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.190571 sshd[5792]: Accepted publickey for core from 10.200.16.10 port 50442 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:38.190000 audit[5792]: CRED_ACQ pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.221880 sshd[5792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:38.251158 systemd[1]: Started session-28.scope. Jul 2 07:59:38.251984 kernel: audit: type=1101 audit(1719907178.188:1447): pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.252103 kernel: audit: type=1103 audit(1719907178.190:1448): pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.253034 systemd-logind[1424]: New session 28 of user core. Jul 2 07:59:38.281871 kernel: audit: type=1006 audit(1719907178.190:1449): pid=5792 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jul 2 07:59:38.282003 kernel: audit: type=1300 audit(1719907178.190:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6d82df80 a2=3 a3=0 items=0 ppid=1 pid=5792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:38.190000 audit[5792]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6d82df80 a2=3 a3=0 items=0 ppid=1 pid=5792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:38.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:38.263000 audit[5792]: USER_START pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.368852 kernel: audit: type=1327 audit(1719907178.190:1449): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:38.369197 kernel: audit: type=1105 audit(1719907178.263:1450): pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.270000 audit[5794]: CRED_ACQ pid=5794 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.394826 kernel: audit: type=1103 audit(1719907178.270:1451): pid=5794 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.709502 sshd[5792]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:38.709000 audit[5792]: USER_END pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.730890 systemd[1]: sshd@25-10.200.8.4:22-10.200.16.10:50442.service: Deactivated successfully. Jul 2 07:59:38.731911 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 07:59:38.734095 systemd-logind[1424]: Session 28 logged out. Waiting for processes to exit. Jul 2 07:59:38.735232 systemd-logind[1424]: Removed session 28. Jul 2 07:59:38.710000 audit[5792]: CRED_DISP pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.770501 kernel: audit: type=1106 audit(1719907178.709:1452): pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.770694 kernel: audit: type=1104 audit(1719907178.710:1453): pid=5792 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:38.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.4:22-10.200.16.10:50442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:46.816584 systemd[1]: run-containerd-runc-k8s.io-746ade9261c67194f118503bd8aab1115966c1a057d2d61bd8576e9b3844f444-runc.dfqaN0.mount: Deactivated successfully. Jul 2 07:59:48.885130 systemd[1]: run-containerd-runc-k8s.io-b6eb6837ac5dad677afa82b5027849b04c470ada50c9d38f1afa05da5a5cccab-runc.6xtbf1.mount: Deactivated successfully. Jul 2 07:59:52.259781 systemd[1]: cri-containerd-a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3.scope: Deactivated successfully. Jul 2 07:59:52.259000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:59:52.260233 systemd[1]: cri-containerd-a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3.scope: Consumed 6.293s CPU time. Jul 2 07:59:52.270473 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:52.270588 kernel: audit: type=1334 audit(1719907192.259:1455): prog-id=115 op=UNLOAD Jul 2 07:59:52.278000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:59:52.293989 kernel: audit: type=1334 audit(1719907192.278:1456): prog-id=118 op=UNLOAD Jul 2 07:59:52.313117 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3-rootfs.mount: Deactivated successfully. Jul 2 07:59:52.314685 env[1438]: time="2024-07-02T07:59:52.314574817Z" level=info msg="shim disconnected" id=a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3 Jul 2 07:59:52.315722 env[1438]: time="2024-07-02T07:59:52.315611151Z" level=warning msg="cleaning up after shim disconnected" id=a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3 namespace=k8s.io Jul 2 07:59:52.315880 env[1438]: time="2024-07-02T07:59:52.315860759Z" level=info msg="cleaning up dead shim" Jul 2 07:59:52.329383 env[1438]: time="2024-07-02T07:59:52.329323602Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5872 runtime=io.containerd.runc.v2\n" Jul 2 07:59:52.862224 kubelet[2596]: I0702 07:59:52.862178 2596 scope.go:117] "RemoveContainer" containerID="a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3" Jul 2 07:59:52.865008 env[1438]: time="2024-07-02T07:59:52.864963803Z" level=info msg="CreateContainer within sandbox \"798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 07:59:52.895840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount737125356.mount: Deactivated successfully. Jul 2 07:59:52.911208 env[1438]: time="2024-07-02T07:59:52.911145821Z" level=info msg="CreateContainer within sandbox \"798a4d5b2fcc778638246cbba1a0be244d17fe051db4103016a7811a91128dc1\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60\"" Jul 2 07:59:52.911915 env[1438]: time="2024-07-02T07:59:52.911879245Z" level=info msg="StartContainer for \"740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60\"" Jul 2 07:59:52.931776 systemd[1]: Started cri-containerd-740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60.scope. Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996639 kernel: audit: type=1400 audit(1719907192.961:1457): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996883 kernel: audit: type=1400 audit(1719907192.961:1458): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.016531 kernel: audit: type=1400 audit(1719907192.961:1459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.035948 kernel: audit: type=1400 audit(1719907192.961:1460): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.060216 kernel: audit: type=1400 audit(1719907192.961:1461): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.091493 kernel: audit: type=1400 audit(1719907192.961:1462): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.091640 kernel: audit: type=1400 audit(1719907192.961:1463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.091670 kernel: audit: type=1400 audit(1719907192.961:1464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.980000 audit: BPF prog-id=209 op=LOAD Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2877 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:52.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734306430353430353637336637393538633962363935393664383866 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2877 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:52.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734306430353430353637336637393538633962363935393664383866 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:52.996000 audit: BPF prog-id=210 op=LOAD Jul 2 07:59:52.996000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000306700 items=0 ppid=2877 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:52.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734306430353430353637336637393538633962363935393664383866 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit: BPF prog-id=211 op=LOAD Jul 2 07:59:53.014000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002837a8 items=0 ppid=2877 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734306430353430353637336637393538633962363935393664383866 Jul 2 07:59:53.014000 audit: BPF prog-id=211 op=UNLOAD Jul 2 07:59:53.014000 audit: BPF prog-id=210 op=UNLOAD Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.014000 audit: BPF prog-id=212 op=LOAD Jul 2 07:59:53.014000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000283bb8 items=0 ppid=2877 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734306430353430353637336637393538633962363935393664383866 Jul 2 07:59:53.119499 env[1438]: time="2024-07-02T07:59:53.119350242Z" level=info msg="StartContainer for \"740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60\" returns successfully" Jul 2 07:59:53.575160 systemd[1]: cri-containerd-106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e.scope: Deactivated successfully. Jul 2 07:59:53.575542 systemd[1]: cri-containerd-106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e.scope: Consumed 4.463s CPU time. Jul 2 07:59:53.577000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:59:53.577000 audit: BPF prog-id=103 op=UNLOAD Jul 2 07:59:53.602726 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e-rootfs.mount: Deactivated successfully. Jul 2 07:59:53.604587 env[1438]: time="2024-07-02T07:59:53.604530400Z" level=info msg="shim disconnected" id=106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e Jul 2 07:59:53.605113 env[1438]: time="2024-07-02T07:59:53.604594702Z" level=warning msg="cleaning up after shim disconnected" id=106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e namespace=k8s.io Jul 2 07:59:53.605113 env[1438]: time="2024-07-02T07:59:53.604609603Z" level=info msg="cleaning up dead shim" Jul 2 07:59:53.613433 env[1438]: time="2024-07-02T07:59:53.613383190Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5937 runtime=io.containerd.runc.v2\n" Jul 2 07:59:53.866925 kubelet[2596]: I0702 07:59:53.866741 2596 scope.go:117] "RemoveContainer" containerID="106be6c8b77ee2a980a1ab7116e7597d60ae6f7eb50b9dcd756336a17b08262e" Jul 2 07:59:53.870247 env[1438]: time="2024-07-02T07:59:53.870199784Z" level=info msg="CreateContainer within sandbox \"43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 07:59:53.908687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3848834068.mount: Deactivated successfully. Jul 2 07:59:53.922004 env[1438]: time="2024-07-02T07:59:53.921942075Z" level=info msg="CreateContainer within sandbox \"43bbdd2c12372bca76b9f83258a49802b70a077132282801359e4436ecf7ce47\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"132286469829319ceced773333e5404eb793bac2df3a9c3ab81ca24cb73c87d1\"" Jul 2 07:59:53.922570 env[1438]: time="2024-07-02T07:59:53.922536594Z" level=info msg="StartContainer for \"132286469829319ceced773333e5404eb793bac2df3a9c3ab81ca24cb73c87d1\"" Jul 2 07:59:53.940646 systemd[1]: Started cri-containerd-132286469829319ceced773333e5404eb793bac2df3a9c3ab81ca24cb73c87d1.scope. Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit: BPF prog-id=213 op=LOAD Jul 2 07:59:53.958000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.958000 audit[5957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2276 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133323238363436393832393331396365636564373733333333653534 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2276 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133323238363436393832393331396365636564373733333333653534 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit: BPF prog-id=214 op=LOAD Jul 2 07:59:53.959000 audit[5957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00028e370 items=0 ppid=2276 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133323238363436393832393331396365636564373733333333653534 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit: BPF prog-id=215 op=LOAD Jul 2 07:59:53.959000 audit[5957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00028e3b8 items=0 ppid=2276 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133323238363436393832393331396365636564373733333333653534 Jul 2 07:59:53.959000 audit: BPF prog-id=215 op=UNLOAD Jul 2 07:59:53.959000 audit: BPF prog-id=214 op=UNLOAD Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { perfmon } for pid=5957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit[5957]: AVC avc: denied { bpf } for pid=5957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:53.959000 audit: BPF prog-id=216 op=LOAD Jul 2 07:59:53.959000 audit[5957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00028e7c8 items=0 ppid=2276 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:53.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133323238363436393832393331396365636564373733333333653534 Jul 2 07:59:54.000115 env[1438]: time="2024-07-02T07:59:54.000043228Z" level=info msg="StartContainer for \"132286469829319ceced773333e5404eb793bac2df3a9c3ab81ca24cb73c87d1\" returns successfully" Jul 2 07:59:54.608000 audit[5967]: AVC avc: denied { watch } for pid=5967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:54.608000 audit[5967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00074c660 a2=fc6 a3=0 items=0 ppid=2276 pid=5967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:54.608000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:54.610000 audit[5967]: AVC avc: denied { watch } for pid=5967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:54.610000 audit[5967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000e01e0 a2=fc6 a3=0 items=0 ppid=2276 pid=5967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c580 key=(null) Jul 2 07:59:54.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:55.368318 kubelet[2596]: E0702 07:59:55.368269 2596 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:56.844058 kubelet[2596]: E0702 07:59:56.843900 2596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.5-a-195c2606d4.17de56793a6a5fbd", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.5-a-195c2606d4", UID:"79ab40356ee216c91ff445b5634a3e80", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.5-a-195c2606d4"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 59, 46, 373189565, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 59, 46, 373189565, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.5-a-195c2606d4"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.4:35126->10.200.8.23:2379: read: connection timed out' (will not retry!) Jul 2 07:59:58.254688 kubelet[2596]: E0702 07:59:58.254646 2596 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.4:35322->10.200.8.23:2379: read: connection timed out" Jul 2 07:59:58.261054 systemd[1]: cri-containerd-bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d.scope: Deactivated successfully. Jul 2 07:59:58.261397 systemd[1]: cri-containerd-bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d.scope: Consumed 2.467s CPU time. Jul 2 07:59:58.264000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:59:58.271101 kernel: kauditd_printk_skb: 114 callbacks suppressed Jul 2 07:59:58.272839 kernel: audit: type=1334 audit(1719907198.264:1497): prog-id=82 op=UNLOAD Jul 2 07:59:58.264000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:59:58.289746 kernel: audit: type=1334 audit(1719907198.264:1498): prog-id=86 op=UNLOAD Jul 2 07:59:58.315998 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d-rootfs.mount: Deactivated successfully. Jul 2 07:59:58.317737 env[1438]: time="2024-07-02T07:59:58.317684297Z" level=info msg="shim disconnected" id=bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d Jul 2 07:59:58.318167 env[1438]: time="2024-07-02T07:59:58.317740199Z" level=warning msg="cleaning up after shim disconnected" id=bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d namespace=k8s.io Jul 2 07:59:58.318167 env[1438]: time="2024-07-02T07:59:58.317753299Z" level=info msg="cleaning up dead shim" Jul 2 07:59:58.327083 env[1438]: time="2024-07-02T07:59:58.327025295Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5997 runtime=io.containerd.runc.v2\n" Jul 2 07:59:58.886689 kubelet[2596]: I0702 07:59:58.886647 2596 scope.go:117] "RemoveContainer" containerID="bc6ef8cbd58c02f2bfd095a41557900716c556f6e1a53112dfbe432a3dad476d" Jul 2 07:59:58.888674 env[1438]: time="2024-07-02T07:59:58.888631483Z" level=info msg="CreateContainer within sandbox \"70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 07:59:58.923420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23034871.mount: Deactivated successfully. Jul 2 07:59:58.937033 env[1438]: time="2024-07-02T07:59:58.936971723Z" level=info msg="CreateContainer within sandbox \"70f29f3906cdd51e94c3ddfa5b0115603b96f1953f9fa8cea4cce11866702860\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"776e0a47186e90130a7abb90b003a5a5f20c1c756af94ababc99162611c4d334\"" Jul 2 07:59:58.937603 env[1438]: time="2024-07-02T07:59:58.937569142Z" level=info msg="StartContainer for \"776e0a47186e90130a7abb90b003a5a5f20c1c756af94ababc99162611c4d334\"" Jul 2 07:59:58.962747 systemd[1]: Started cri-containerd-776e0a47186e90130a7abb90b003a5a5f20c1c756af94ababc99162611c4d334.scope. Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007921 kernel: audit: type=1400 audit(1719907198.977:1499): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.008110 kernel: audit: type=1400 audit(1719907198.977:1500): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.031090 kernel: audit: type=1400 audit(1719907198.977:1501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.031249 kernel: audit: type=1400 audit(1719907198.977:1502): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.052857 kernel: audit: type=1400 audit(1719907198.977:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.113000 kernel: audit: type=1400 audit(1719907198.977:1504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.113175 kernel: audit: type=1400 audit(1719907198.977:1505): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.113206 kernel: audit: type=1400 audit(1719907198.977:1506): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.992000 audit: BPF prog-id=217 op=LOAD Jul 2 07:59:58.992000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.992000 audit[6018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2310 pid=6018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:58.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737366530613437313836653930313330613761626239306230303361 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2310 pid=6018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:58.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737366530613437313836653930313330613761626239306230303361 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:58.993000 audit: BPF prog-id=218 op=LOAD Jul 2 07:59:58.993000 audit[6018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003096c0 items=0 ppid=2310 pid=6018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:58.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737366530613437313836653930313330613761626239306230303361 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.006000 audit: BPF prog-id=219 op=LOAD Jul 2 07:59:59.006000 audit[6018]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000309708 items=0 ppid=2310 pid=6018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:59.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737366530613437313836653930313330613761626239306230303361 Jul 2 07:59:59.007000 audit: BPF prog-id=219 op=UNLOAD Jul 2 07:59:59.007000 audit: BPF prog-id=218 op=UNLOAD Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { perfmon } for pid=6018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit[6018]: AVC avc: denied { bpf } for pid=6018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:59.007000 audit: BPF prog-id=220 op=LOAD Jul 2 07:59:59.007000 audit[6018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000309b18 items=0 ppid=2310 pid=6018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:59.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737366530613437313836653930313330613761626239306230303361 Jul 2 07:59:59.149652 env[1438]: time="2024-07-02T07:59:59.149524670Z" level=info msg="StartContainer for \"776e0a47186e90130a7abb90b003a5a5f20c1c756af94ababc99162611c4d334\" returns successfully" Jul 2 08:00:02.861167 kubelet[2596]: I0702 08:00:02.861117 2596 status_manager.go:853] "Failed to get status for pod" podUID="79ab40356ee216c91ff445b5634a3e80" pod="kube-system/kube-apiserver-ci-3510.3.5-a-195c2606d4" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.4:35220->10.200.8.23:2379: read: connection timed out" Jul 2 08:00:03.017000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.017000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c011613260 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.017000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:03.030000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.030000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007cd0750 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:03.034000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.034000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007cd0780 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:03.034000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6374 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.034000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007cd07b0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:03.035000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.035000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c0055b2ba0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.035000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:03.069000 audit[2417]: AVC avc: denied { watch } for pid=2417 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:00:03.069000 audit[2417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c0055b2bc0 a2=fc6 a3=0 items=0 ppid=2289 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c895 key=(null) Jul 2 08:00:03.069000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Jul 2 08:00:04.593673 systemd[1]: cri-containerd-740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60.scope: Deactivated successfully. Jul 2 08:00:04.593000 audit: BPF prog-id=209 op=UNLOAD Jul 2 08:00:04.602371 kernel: kauditd_printk_skb: 67 callbacks suppressed Jul 2 08:00:04.602527 kernel: audit: type=1334 audit(1719907204.593:1523): prog-id=209 op=UNLOAD Jul 2 08:00:04.611000 audit: BPF prog-id=212 op=UNLOAD Jul 2 08:00:04.618842 kernel: audit: type=1334 audit(1719907204.611:1524): prog-id=212 op=UNLOAD Jul 2 08:00:04.627885 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60-rootfs.mount: Deactivated successfully. Jul 2 08:00:04.676130 env[1438]: time="2024-07-02T08:00:04.675963771Z" level=info msg="shim disconnected" id=740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60 Jul 2 08:00:04.676130 env[1438]: time="2024-07-02T08:00:04.676126176Z" level=warning msg="cleaning up after shim disconnected" id=740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60 namespace=k8s.io Jul 2 08:00:04.676130 env[1438]: time="2024-07-02T08:00:04.676140376Z" level=info msg="cleaning up dead shim" Jul 2 08:00:04.686507 env[1438]: time="2024-07-02T08:00:04.686447995Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:00:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6086 runtime=io.containerd.runc.v2\n" Jul 2 08:00:04.906440 kubelet[2596]: I0702 08:00:04.905658 2596 scope.go:117] "RemoveContainer" containerID="a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3" Jul 2 08:00:04.906991 kubelet[2596]: I0702 08:00:04.906953 2596 scope.go:117] "RemoveContainer" containerID="740d05405673f7958c9b69596d88ff53a218956cc13f62b03ffd59c33dc06c60" Jul 2 08:00:04.907259 kubelet[2596]: E0702 08:00:04.907236 2596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-76c4974c85-dhv9n_tigera-operator(07e32447-7804-4348-9644-12fa42ee5a00)\"" pod="tigera-operator/tigera-operator-76c4974c85-dhv9n" podUID="07e32447-7804-4348-9644-12fa42ee5a00" Jul 2 08:00:04.908606 env[1438]: time="2024-07-02T08:00:04.908564166Z" level=info msg="RemoveContainer for \"a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3\"" Jul 2 08:00:04.922108 env[1438]: time="2024-07-02T08:00:04.922051283Z" level=info msg="RemoveContainer for \"a55290bb936066ffc0599e778c24f22875d9f07a7f14443371d242f6586a60e3\" returns successfully" Jul 2 08:00:08.256376 kubelet[2596]: E0702 08:00:08.256337 2596 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-195c2606d4?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"