Jul 2 07:53:14.050703 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:53:14.050727 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:14.050738 kernel: BIOS-provided physical RAM map: Jul 2 07:53:14.050743 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 2 07:53:14.050752 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Jul 2 07:53:14.050758 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Jul 2 07:53:14.050767 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Jul 2 07:53:14.050773 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Jul 2 07:53:14.050780 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Jul 2 07:53:14.050787 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Jul 2 07:53:14.050793 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Jul 2 07:53:14.050799 kernel: printk: bootconsole [earlyser0] enabled Jul 2 07:53:14.050806 kernel: NX (Execute Disable) protection: active Jul 2 07:53:14.050813 kernel: efi: EFI v2.70 by Microsoft Jul 2 07:53:14.050823 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Jul 2 07:53:14.050833 kernel: random: crng init done Jul 2 07:53:14.050839 kernel: SMBIOS 3.1.0 present. Jul 2 07:53:14.050846 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Jul 2 07:53:14.050855 kernel: Hypervisor detected: Microsoft Hyper-V Jul 2 07:53:14.050861 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Jul 2 07:53:14.050867 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Jul 2 07:53:14.050876 kernel: Hyper-V: Nested features: 0x1e0101 Jul 2 07:53:14.050885 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Jul 2 07:53:14.050892 kernel: Hyper-V: Using hypercall for remote TLB flush Jul 2 07:53:14.050901 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Jul 2 07:53:14.050908 kernel: tsc: Marking TSC unstable due to running on Hyper-V Jul 2 07:53:14.050929 kernel: tsc: Detected 2593.906 MHz processor Jul 2 07:53:14.050936 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:53:14.050946 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:53:14.050953 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Jul 2 07:53:14.050959 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:53:14.050969 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Jul 2 07:53:14.050981 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Jul 2 07:53:14.050989 kernel: Using GB pages for direct mapping Jul 2 07:53:14.050996 kernel: Secure boot disabled Jul 2 07:53:14.051004 kernel: ACPI: Early table checksum verification disabled Jul 2 07:53:14.051012 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Jul 2 07:53:14.051020 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051028 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051042 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 07:53:14.051058 kernel: ACPI: FACS 0x000000003FFFE000 000040 Jul 2 07:53:14.051065 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051073 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051082 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051088 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051097 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051107 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051114 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:53:14.051123 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Jul 2 07:53:14.051131 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Jul 2 07:53:14.051137 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Jul 2 07:53:14.051147 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Jul 2 07:53:14.051155 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Jul 2 07:53:14.051161 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Jul 2 07:53:14.051173 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Jul 2 07:53:14.051180 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Jul 2 07:53:14.051187 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Jul 2 07:53:14.051196 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Jul 2 07:53:14.051203 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:53:14.051210 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:53:14.051220 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Jul 2 07:53:14.051227 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Jul 2 07:53:14.051234 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Jul 2 07:53:14.051245 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Jul 2 07:53:14.051252 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Jul 2 07:53:14.051261 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Jul 2 07:53:14.051270 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Jul 2 07:53:14.051276 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Jul 2 07:53:14.051287 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Jul 2 07:53:14.051294 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Jul 2 07:53:14.051301 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Jul 2 07:53:14.051310 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Jul 2 07:53:14.051319 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Jul 2 07:53:14.051328 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Jul 2 07:53:14.051336 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Jul 2 07:53:14.051343 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Jul 2 07:53:14.051351 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Jul 2 07:53:14.051360 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Jul 2 07:53:14.051366 kernel: Zone ranges: Jul 2 07:53:14.051376 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:53:14.051383 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:53:14.051392 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:53:14.051402 kernel: Movable zone start for each node Jul 2 07:53:14.051409 kernel: Early memory node ranges Jul 2 07:53:14.051418 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 2 07:53:14.051427 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Jul 2 07:53:14.051436 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Jul 2 07:53:14.051444 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:53:14.051453 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Jul 2 07:53:14.051460 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:53:14.051471 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 2 07:53:14.051481 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Jul 2 07:53:14.051487 kernel: ACPI: PM-Timer IO Port: 0x408 Jul 2 07:53:14.051495 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Jul 2 07:53:14.051504 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:53:14.051511 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:53:14.051519 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:53:14.051528 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Jul 2 07:53:14.051535 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:53:14.051543 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Jul 2 07:53:14.051550 kernel: Booting paravirtualized kernel on Hyper-V Jul 2 07:53:14.051557 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:53:14.051564 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:53:14.051571 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:53:14.051577 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:53:14.051584 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:53:14.051591 kernel: Hyper-V: PV spinlocks enabled Jul 2 07:53:14.051597 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:53:14.051606 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Jul 2 07:53:14.051613 kernel: Policy zone: Normal Jul 2 07:53:14.051620 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:14.051627 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:53:14.051634 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:53:14.051641 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:53:14.051647 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:53:14.051654 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 308112K reserved, 0K cma-reserved) Jul 2 07:53:14.051663 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:53:14.051670 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:53:14.051684 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:53:14.051693 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:53:14.051701 kernel: rcu: RCU event tracing is enabled. Jul 2 07:53:14.051709 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:53:14.051716 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:53:14.051723 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:53:14.051730 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:53:14.051738 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:53:14.051747 kernel: Using NULL legacy PIC Jul 2 07:53:14.051757 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Jul 2 07:53:14.051767 kernel: Console: colour dummy device 80x25 Jul 2 07:53:14.051775 kernel: printk: console [tty1] enabled Jul 2 07:53:14.051782 kernel: printk: console [ttyS0] enabled Jul 2 07:53:14.051789 kernel: printk: bootconsole [earlyser0] disabled Jul 2 07:53:14.051801 kernel: ACPI: Core revision 20210730 Jul 2 07:53:14.051809 kernel: Failed to register legacy timer interrupt Jul 2 07:53:14.051816 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:53:14.051826 kernel: Hyper-V: Using IPI hypercalls Jul 2 07:53:14.051834 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Jul 2 07:53:14.051842 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:53:14.051851 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:53:14.051858 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:53:14.051868 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:53:14.051876 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:53:14.051886 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:53:14.051896 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jul 2 07:53:14.051903 kernel: RETBleed: Vulnerable Jul 2 07:53:14.051911 kernel: Speculative Store Bypass: Vulnerable Jul 2 07:53:14.051926 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:14.051935 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:14.051943 kernel: GDS: Unknown: Dependent on hypervisor status Jul 2 07:53:14.051950 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:53:14.051960 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:53:14.051968 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:53:14.051978 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 2 07:53:14.051988 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 2 07:53:14.051995 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 2 07:53:14.052004 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:53:14.052012 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Jul 2 07:53:14.052020 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Jul 2 07:53:14.052031 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Jul 2 07:53:14.052038 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Jul 2 07:53:14.052048 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:53:14.052056 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:53:14.052066 kernel: LSM: Security Framework initializing Jul 2 07:53:14.052073 kernel: SELinux: Initializing. Jul 2 07:53:14.052085 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:14.052094 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:14.052102 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Jul 2 07:53:14.052112 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 2 07:53:14.052120 kernel: signal: max sigframe size: 3632 Jul 2 07:53:14.052129 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:53:14.052137 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:53:14.052144 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:53:14.052155 kernel: x86: Booting SMP configuration: Jul 2 07:53:14.052163 kernel: .... node #0, CPUs: #1 Jul 2 07:53:14.052174 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Jul 2 07:53:14.052183 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:53:14.052190 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:53:14.052201 kernel: smpboot: Max logical packages: 1 Jul 2 07:53:14.052209 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Jul 2 07:53:14.052217 kernel: devtmpfs: initialized Jul 2 07:53:14.052226 kernel: x86/mm: Memory block size: 128MB Jul 2 07:53:14.052234 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Jul 2 07:53:14.052245 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:53:14.052253 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:53:14.052260 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:53:14.052270 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:53:14.052278 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:53:14.052285 kernel: audit: type=2000 audit(1719906792.023:1): state=initialized audit_enabled=0 res=1 Jul 2 07:53:14.052295 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:53:14.052303 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:53:14.052311 kernel: cpuidle: using governor menu Jul 2 07:53:14.052323 kernel: ACPI: bus type PCI registered Jul 2 07:53:14.052330 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:53:14.052341 kernel: dca service started, version 1.12.1 Jul 2 07:53:14.052348 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:53:14.052356 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:53:14.052366 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:53:14.052373 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:53:14.052382 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:53:14.052391 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:53:14.052400 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:53:14.052411 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:53:14.052418 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:53:14.052426 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:53:14.052435 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:53:14.052443 kernel: ACPI: Interpreter enabled Jul 2 07:53:14.052452 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:53:14.052460 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:53:14.052471 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:53:14.052482 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Jul 2 07:53:14.052492 kernel: iommu: Default domain type: Translated Jul 2 07:53:14.052499 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:53:14.052509 kernel: vgaarb: loaded Jul 2 07:53:14.052517 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:53:14.052526 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:53:14.052536 kernel: PTP clock support registered Jul 2 07:53:14.052544 kernel: Registered efivars operations Jul 2 07:53:14.052551 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:53:14.052561 kernel: PCI: System does not support PCI Jul 2 07:53:14.052570 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Jul 2 07:53:14.052580 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:53:14.052589 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:53:14.052597 kernel: pnp: PnP ACPI init Jul 2 07:53:14.052607 kernel: pnp: PnP ACPI: found 3 devices Jul 2 07:53:14.052615 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:53:14.052624 kernel: NET: Registered PF_INET protocol family Jul 2 07:53:14.052634 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:53:14.052647 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:53:14.052654 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:53:14.052662 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:53:14.052672 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:53:14.052679 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:53:14.052689 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:14.052699 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:14.052706 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:53:14.052713 kernel: NET: Registered PF_XDP protocol family Jul 2 07:53:14.052724 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:53:14.052733 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:53:14.052740 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Jul 2 07:53:14.052747 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:53:14.052754 kernel: Initialise system trusted keyrings Jul 2 07:53:14.052761 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:53:14.052772 kernel: Key type asymmetric registered Jul 2 07:53:14.052779 kernel: Asymmetric key parser 'x509' registered Jul 2 07:53:14.052786 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:53:14.052795 kernel: io scheduler mq-deadline registered Jul 2 07:53:14.052806 kernel: io scheduler kyber registered Jul 2 07:53:14.052813 kernel: io scheduler bfq registered Jul 2 07:53:14.052823 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:53:14.052831 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:53:14.052842 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:53:14.052849 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:53:14.052861 kernel: i8042: PNP: No PS/2 controller found. Jul 2 07:53:14.053028 kernel: rtc_cmos 00:02: registered as rtc0 Jul 2 07:53:14.053147 kernel: rtc_cmos 00:02: setting system clock to 2024-07-02T07:53:13 UTC (1719906793) Jul 2 07:53:14.053254 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Jul 2 07:53:14.053271 kernel: fail to initialize ptp_kvm Jul 2 07:53:14.053286 kernel: intel_pstate: CPU model not supported Jul 2 07:53:14.053299 kernel: efifb: probing for efifb Jul 2 07:53:14.053312 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 07:53:14.053325 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 07:53:14.053338 kernel: efifb: scrolling: redraw Jul 2 07:53:14.053356 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 07:53:14.053369 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:53:14.053383 kernel: fb0: EFI VGA frame buffer device Jul 2 07:53:14.053396 kernel: pstore: Registered efi as persistent store backend Jul 2 07:53:14.053410 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:53:14.053423 kernel: Segment Routing with IPv6 Jul 2 07:53:14.053437 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:53:14.053450 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:53:14.053464 kernel: Key type dns_resolver registered Jul 2 07:53:14.053480 kernel: IPI shorthand broadcast: enabled Jul 2 07:53:14.053494 kernel: sched_clock: Marking stable (778003400, 22585600)->(1000065900, -199476900) Jul 2 07:53:14.053507 kernel: registered taskstats version 1 Jul 2 07:53:14.053521 kernel: Loading compiled-in X.509 certificates Jul 2 07:53:14.053535 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:53:14.053548 kernel: Key type .fscrypt registered Jul 2 07:53:14.053561 kernel: Key type fscrypt-provisioning registered Jul 2 07:53:14.053575 kernel: pstore: Using crash dump compression: deflate Jul 2 07:53:14.053591 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:53:14.053604 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:53:14.053618 kernel: ima: No architecture policies found Jul 2 07:53:14.053631 kernel: clk: Disabling unused clocks Jul 2 07:53:14.053645 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:53:14.053658 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:53:14.053672 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:53:14.053686 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:53:14.053700 kernel: Run /init as init process Jul 2 07:53:14.053713 kernel: with arguments: Jul 2 07:53:14.053729 kernel: /init Jul 2 07:53:14.053743 kernel: with environment: Jul 2 07:53:14.053756 kernel: HOME=/ Jul 2 07:53:14.053769 kernel: TERM=linux Jul 2 07:53:14.053782 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:53:14.053799 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:14.053816 systemd[1]: Detected virtualization microsoft. Jul 2 07:53:14.053833 systemd[1]: Detected architecture x86-64. Jul 2 07:53:14.053847 systemd[1]: Running in initrd. Jul 2 07:53:14.053861 systemd[1]: No hostname configured, using default hostname. Jul 2 07:53:14.053875 systemd[1]: Hostname set to . Jul 2 07:53:14.053890 systemd[1]: Initializing machine ID from random generator. Jul 2 07:53:14.053904 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:53:14.053938 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:14.053952 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:14.053966 systemd[1]: Reached target paths.target. Jul 2 07:53:14.053983 systemd[1]: Reached target slices.target. Jul 2 07:53:14.053997 systemd[1]: Reached target swap.target. Jul 2 07:53:14.054011 systemd[1]: Reached target timers.target. Jul 2 07:53:14.054027 systemd[1]: Listening on iscsid.socket. Jul 2 07:53:14.054041 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:53:14.054055 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:53:14.054070 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:53:14.054087 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:53:14.054102 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:14.054116 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:14.054131 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:14.054145 systemd[1]: Reached target sockets.target. Jul 2 07:53:14.054159 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:14.054174 systemd[1]: Finished network-cleanup.service. Jul 2 07:53:14.054188 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:53:14.054202 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:14.054219 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:14.054233 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:14.054247 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:53:14.054262 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:14.054281 systemd-journald[183]: Journal started Jul 2 07:53:14.054345 systemd-journald[183]: Runtime Journal (/run/log/journal/a2bf5de15e14432cb808f3c59ac2729c) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:53:14.037206 systemd-modules-load[184]: Inserted module 'overlay' Jul 2 07:53:14.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.080778 kernel: audit: type=1130 audit(1719906794.064:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.080812 systemd[1]: Started systemd-journald.service. Jul 2 07:53:14.085359 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:53:14.089750 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:53:14.114936 kernel: audit: type=1130 audit(1719906794.084:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.114960 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:53:14.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.123121 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:53:14.128731 kernel: Bridge firewalling registered Jul 2 07:53:14.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.143448 kernel: audit: type=1130 audit(1719906794.087:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.140585 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:14.153591 systemd-modules-load[184]: Inserted module 'br_netfilter' Jul 2 07:53:14.156453 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:14.165116 systemd-resolved[185]: Positive Trust Anchors: Jul 2 07:53:14.165135 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:14.165179 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:14.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.188933 kernel: audit: type=1130 audit(1719906794.120:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.193356 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:53:14.198563 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:53:14.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.206856 systemd-resolved[185]: Defaulting to hostname 'linux'. Jul 2 07:53:14.232325 kernel: SCSI subsystem initialized Jul 2 07:53:14.232349 kernel: audit: type=1130 audit(1719906794.158:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.232363 dracut-cmdline[200]: dracut-dracut-053 Jul 2 07:53:14.232363 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:14.207769 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:14.229302 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:14.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.254971 kernel: audit: type=1130 audit(1719906794.197:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.271160 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:53:14.271197 kernel: audit: type=1130 audit(1719906794.228:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.283273 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:53:14.291929 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:53:14.295963 systemd-modules-load[184]: Inserted module 'dm_multipath' Jul 2 07:53:14.297451 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:14.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.304637 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:14.325049 kernel: audit: type=1130 audit(1719906794.301:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.330623 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:14.349866 kernel: audit: type=1130 audit(1719906794.332:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.367934 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:53:14.387934 kernel: iscsi: registered transport (tcp) Jul 2 07:53:14.413760 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:53:14.413813 kernel: QLogic iSCSI HBA Driver Jul 2 07:53:14.442544 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:53:14.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.445978 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:53:14.500943 kernel: raid6: avx512x4 gen() 18396 MB/s Jul 2 07:53:14.519926 kernel: raid6: avx512x4 xor() 7316 MB/s Jul 2 07:53:14.539924 kernel: raid6: avx512x2 gen() 18354 MB/s Jul 2 07:53:14.561929 kernel: raid6: avx512x2 xor() 29748 MB/s Jul 2 07:53:14.581923 kernel: raid6: avx512x1 gen() 18232 MB/s Jul 2 07:53:14.601926 kernel: raid6: avx512x1 xor() 26997 MB/s Jul 2 07:53:14.621926 kernel: raid6: avx2x4 gen() 18300 MB/s Jul 2 07:53:14.641924 kernel: raid6: avx2x4 xor() 6815 MB/s Jul 2 07:53:14.661923 kernel: raid6: avx2x2 gen() 18291 MB/s Jul 2 07:53:14.681928 kernel: raid6: avx2x2 xor() 22209 MB/s Jul 2 07:53:14.701925 kernel: raid6: avx2x1 gen() 13965 MB/s Jul 2 07:53:14.721925 kernel: raid6: avx2x1 xor() 19433 MB/s Jul 2 07:53:14.742925 kernel: raid6: sse2x4 gen() 11745 MB/s Jul 2 07:53:14.762924 kernel: raid6: sse2x4 xor() 5981 MB/s Jul 2 07:53:14.782925 kernel: raid6: sse2x2 gen() 12878 MB/s Jul 2 07:53:14.802927 kernel: raid6: sse2x2 xor() 7620 MB/s Jul 2 07:53:14.822923 kernel: raid6: sse2x1 gen() 11652 MB/s Jul 2 07:53:14.846606 kernel: raid6: sse2x1 xor() 5910 MB/s Jul 2 07:53:14.846634 kernel: raid6: using algorithm avx512x4 gen() 18396 MB/s Jul 2 07:53:14.846645 kernel: raid6: .... xor() 7316 MB/s, rmw enabled Jul 2 07:53:14.855094 kernel: raid6: using avx512x2 recovery algorithm Jul 2 07:53:14.870944 kernel: xor: automatically using best checksumming function avx Jul 2 07:53:14.966945 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:53:14.975768 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:53:14.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.980000 audit: BPF prog-id=7 op=LOAD Jul 2 07:53:14.980000 audit: BPF prog-id=8 op=LOAD Jul 2 07:53:14.981267 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:15.001691 systemd-udevd[383]: Using default interface naming scheme 'v252'. Jul 2 07:53:15.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:15.006453 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:15.009813 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:53:15.026627 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Jul 2 07:53:15.057841 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:53:15.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:15.060997 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:15.096728 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:15.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:15.142937 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:53:15.177039 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:53:15.177115 kernel: AES CTR mode by8 optimization enabled Jul 2 07:53:15.183940 kernel: hv_vmbus: Vmbus version:5.2 Jul 2 07:53:15.212968 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 07:53:15.213034 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 07:53:15.222937 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 07:53:15.235031 kernel: scsi host0: storvsc_host_t Jul 2 07:53:15.235327 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 07:53:15.240509 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 07:53:15.240579 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 07:53:15.244032 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 07:53:15.249373 kernel: scsi host1: storvsc_host_t Jul 2 07:53:15.266936 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 07:53:15.292046 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 07:53:15.292116 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 07:53:15.299567 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 07:53:15.299807 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 07:53:15.300940 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 07:53:15.316925 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 07:53:15.317170 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 07:53:15.317299 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 07:53:15.325435 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 07:53:15.325635 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 07:53:15.332938 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:15.336935 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 07:53:15.428241 kernel: hv_netvsc 000d3ad9-7e72-000d-3ad9-7e72000d3ad9 eth0: VF slot 1 added Jul 2 07:53:15.437931 kernel: hv_vmbus: registering driver hv_pci Jul 2 07:53:15.443928 kernel: hv_pci dbb053e2-f1a9-4224-bf91-de5d59838465: PCI VMBus probing: Using version 0x10004 Jul 2 07:53:15.456905 kernel: hv_pci dbb053e2-f1a9-4224-bf91-de5d59838465: PCI host bridge to bus f1a9:00 Jul 2 07:53:15.457083 kernel: pci_bus f1a9:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Jul 2 07:53:15.457223 kernel: pci_bus f1a9:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 07:53:15.466960 kernel: pci f1a9:00:02.0: [15b3:1016] type 00 class 0x020000 Jul 2 07:53:15.477172 kernel: pci f1a9:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:53:15.493073 kernel: pci f1a9:00:02.0: enabling Extended Tags Jul 2 07:53:15.507157 kernel: pci f1a9:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at f1a9:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Jul 2 07:53:15.517468 kernel: pci_bus f1a9:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 07:53:15.517655 kernel: pci f1a9:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:53:15.611938 kernel: mlx5_core f1a9:00:02.0: firmware version: 14.30.1284 Jul 2 07:53:15.664326 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:53:15.698935 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (449) Jul 2 07:53:15.719452 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:15.772936 kernel: mlx5_core f1a9:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 07:53:15.862766 kernel: mlx5_core f1a9:00:02.0: Supported tc offload range - chains: 1, prios: 1 Jul 2 07:53:15.863042 kernel: mlx5_core f1a9:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Jul 2 07:53:15.867073 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:53:15.876245 kernel: hv_netvsc 000d3ad9-7e72-000d-3ad9-7e72000d3ad9 eth0: VF registering: eth1 Jul 2 07:53:15.881043 kernel: mlx5_core f1a9:00:02.0 eth1: joined to eth0 Jul 2 07:53:15.886761 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:53:15.895929 kernel: mlx5_core f1a9:00:02.0 enP61865s1: renamed from eth1 Jul 2 07:53:15.896338 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:53:15.902080 systemd[1]: Starting disk-uuid.service... Jul 2 07:53:15.919936 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:15.928936 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:16.937934 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:16.938496 disk-uuid[562]: The operation has completed successfully. Jul 2 07:53:17.007495 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:53:17.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.007610 systemd[1]: Finished disk-uuid.service. Jul 2 07:53:17.019768 systemd[1]: Starting verity-setup.service... Jul 2 07:53:17.057801 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:53:17.229526 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:53:17.236134 systemd[1]: Finished verity-setup.service. Jul 2 07:53:17.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.240726 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:53:17.318678 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:17.316772 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:53:17.318856 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:53:17.319709 systemd[1]: Starting ignition-setup.service... Jul 2 07:53:17.327782 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:53:17.351981 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:17.352039 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:17.352058 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:17.405147 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:53:17.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.409000 audit: BPF prog-id=9 op=LOAD Jul 2 07:53:17.410682 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:17.413993 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:53:17.438375 systemd-networkd[806]: lo: Link UP Jul 2 07:53:17.438386 systemd-networkd[806]: lo: Gained carrier Jul 2 07:53:17.442383 systemd-networkd[806]: Enumeration completed Jul 2 07:53:17.442487 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:17.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.446680 systemd[1]: Reached target network.target. Jul 2 07:53:17.447114 systemd-networkd[806]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:17.456801 systemd[1]: Starting iscsiuio.service... Jul 2 07:53:17.463796 systemd[1]: Started iscsiuio.service. Jul 2 07:53:17.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.468471 systemd[1]: Starting iscsid.service... Jul 2 07:53:17.474253 systemd[1]: Started iscsid.service. Jul 2 07:53:17.479678 iscsid[812]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:17.479678 iscsid[812]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:53:17.479678 iscsid[812]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:53:17.479678 iscsid[812]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:53:17.479678 iscsid[812]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:53:17.479678 iscsid[812]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:17.479678 iscsid[812]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:53:17.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.514855 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:53:17.532099 kernel: mlx5_core f1a9:00:02.0 enP61865s1: Link up Jul 2 07:53:17.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.518378 systemd[1]: Finished ignition-setup.service. Jul 2 07:53:17.526464 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:53:17.539293 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:53:17.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.541529 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:53:17.545514 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:17.547710 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:17.570054 kernel: hv_netvsc 000d3ad9-7e72-000d-3ad9-7e72000d3ad9 eth0: Data path switched to VF: enP61865s1 Jul 2 07:53:17.570271 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:53:17.550388 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:53:17.564470 systemd-networkd[806]: enP61865s1: Link UP Jul 2 07:53:17.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:17.564682 systemd-networkd[806]: eth0: Link UP Jul 2 07:53:17.565237 systemd-networkd[806]: eth0: Gained carrier Jul 2 07:53:17.570598 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:53:17.577436 systemd-networkd[806]: enP61865s1: Gained carrier Jul 2 07:53:17.602002 systemd-networkd[806]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:53:18.920186 systemd-networkd[806]: eth0: Gained IPv6LL Jul 2 07:53:20.659229 ignition[817]: Ignition 2.14.0 Jul 2 07:53:20.659248 ignition[817]: Stage: fetch-offline Jul 2 07:53:20.659353 ignition[817]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:20.659407 ignition[817]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:20.759058 ignition[817]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:20.759244 ignition[817]: parsed url from cmdline: "" Jul 2 07:53:20.761516 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:53:20.759248 ignition[817]: no config URL provided Jul 2 07:53:20.785868 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 07:53:20.785902 kernel: audit: type=1130 audit(1719906800.766:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.772586 systemd[1]: Starting ignition-fetch.service... Jul 2 07:53:20.759254 ignition[817]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:20.759264 ignition[817]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:20.759271 ignition[817]: failed to fetch config: resource requires networking Jul 2 07:53:20.760480 ignition[817]: Ignition finished successfully Jul 2 07:53:20.781440 ignition[834]: Ignition 2.14.0 Jul 2 07:53:20.781445 ignition[834]: Stage: fetch Jul 2 07:53:20.781554 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:20.781583 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:20.786605 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:20.786859 ignition[834]: parsed url from cmdline: "" Jul 2 07:53:20.786866 ignition[834]: no config URL provided Jul 2 07:53:20.786873 ignition[834]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:20.786882 ignition[834]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:20.786939 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 07:53:20.869954 ignition[834]: GET result: OK Jul 2 07:53:20.870133 ignition[834]: config has been read from IMDS userdata Jul 2 07:53:20.870170 ignition[834]: parsing config with SHA512: fae9a98d47fc7871cf65c52c5e9009e7606989b69adc94f9c5b110abd5ff575842b05a0ae09906b8b3cf12494e6dcddb9168a127516a7a008601e108c87fa48c Jul 2 07:53:20.877888 unknown[834]: fetched base config from "system" Jul 2 07:53:20.877901 unknown[834]: fetched base config from "system" Jul 2 07:53:20.877909 unknown[834]: fetched user config from "azure" Jul 2 07:53:20.884306 ignition[834]: fetch: fetch complete Jul 2 07:53:20.884316 ignition[834]: fetch: fetch passed Jul 2 07:53:20.884380 ignition[834]: Ignition finished successfully Jul 2 07:53:20.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.887353 systemd[1]: Finished ignition-fetch.service. Jul 2 07:53:20.913424 kernel: audit: type=1130 audit(1719906800.889:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.891045 systemd[1]: Starting ignition-kargs.service... Jul 2 07:53:20.914837 ignition[840]: Ignition 2.14.0 Jul 2 07:53:20.914846 ignition[840]: Stage: kargs Jul 2 07:53:20.914989 ignition[840]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:20.915028 ignition[840]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:20.921299 ignition[840]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:20.923785 ignition[840]: kargs: kargs passed Jul 2 07:53:20.923825 ignition[840]: Ignition finished successfully Jul 2 07:53:20.928941 systemd[1]: Finished ignition-kargs.service. Jul 2 07:53:20.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.945364 kernel: audit: type=1130 audit(1719906800.930:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.943206 systemd[1]: Starting ignition-disks.service... Jul 2 07:53:20.951158 ignition[846]: Ignition 2.14.0 Jul 2 07:53:20.951168 ignition[846]: Stage: disks Jul 2 07:53:20.951295 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:20.951322 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:20.958912 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:20.961360 ignition[846]: disks: disks passed Jul 2 07:53:20.961404 ignition[846]: Ignition finished successfully Jul 2 07:53:20.965659 systemd[1]: Finished ignition-disks.service. Jul 2 07:53:20.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.979278 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:53:20.984908 kernel: audit: type=1130 audit(1719906800.967:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.984946 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:20.988880 systemd[1]: Reached target local-fs.target. Jul 2 07:53:20.992254 systemd[1]: Reached target sysinit.target. Jul 2 07:53:20.994379 systemd[1]: Reached target basic.target. Jul 2 07:53:20.996466 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:53:21.050928 systemd-fsck[854]: ROOT: clean, 614/7326000 files, 481076/7359488 blocks Jul 2 07:53:21.076299 kernel: audit: type=1130 audit(1719906801.060:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.057675 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:53:21.076558 systemd[1]: Mounting sysroot.mount... Jul 2 07:53:21.096943 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:21.096896 systemd[1]: Mounted sysroot.mount. Jul 2 07:53:21.100307 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:53:21.179966 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:53:21.186042 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 07:53:21.190870 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:53:21.191848 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:53:21.200963 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:53:21.244185 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:21.250145 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:53:21.257947 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) Jul 2 07:53:21.270800 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:21.270845 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:21.270858 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:21.278194 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:21.284138 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:53:21.296469 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:53:21.314808 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:53:21.321684 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:53:21.823910 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:53:21.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.827336 systemd[1]: Starting ignition-mount.service... Jul 2 07:53:21.849226 kernel: audit: type=1130 audit(1719906801.825:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.841750 systemd[1]: Starting sysroot-boot.service... Jul 2 07:53:21.853265 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:21.853394 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:21.871257 systemd[1]: Finished sysroot-boot.service. Jul 2 07:53:21.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.878981 ignition[933]: INFO : Ignition 2.14.0 Jul 2 07:53:21.892805 kernel: audit: type=1130 audit(1719906801.875:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.892833 kernel: audit: type=1130 audit(1719906801.891:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:21.892897 ignition[933]: INFO : Stage: mount Jul 2 07:53:21.892897 ignition[933]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:21.892897 ignition[933]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:21.892897 ignition[933]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:21.892897 ignition[933]: INFO : mount: mount passed Jul 2 07:53:21.892897 ignition[933]: INFO : Ignition finished successfully Jul 2 07:53:21.884871 systemd[1]: Finished ignition-mount.service. Jul 2 07:53:22.709639 coreos-metadata[864]: Jul 02 07:53:22.709 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 07:53:22.726310 coreos-metadata[864]: Jul 02 07:53:22.726 INFO Fetch successful Jul 2 07:53:22.762838 coreos-metadata[864]: Jul 02 07:53:22.762 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 07:53:22.779513 coreos-metadata[864]: Jul 02 07:53:22.779 INFO Fetch successful Jul 2 07:53:22.795037 coreos-metadata[864]: Jul 02 07:53:22.794 INFO wrote hostname ci-3510.3.5-a-cc7572d280 to /sysroot/etc/hostname Jul 2 07:53:22.800551 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 07:53:22.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:22.806212 systemd[1]: Starting ignition-files.service... Jul 2 07:53:22.819183 kernel: audit: type=1130 audit(1719906802.804:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:22.825087 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:22.838936 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) Jul 2 07:53:22.847986 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:22.848020 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:22.848034 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:22.856351 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:22.870128 ignition[962]: INFO : Ignition 2.14.0 Jul 2 07:53:22.870128 ignition[962]: INFO : Stage: files Jul 2 07:53:22.873755 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:22.873755 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:22.887942 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:22.905279 ignition[962]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:53:22.908720 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:53:22.908720 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:53:23.006113 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:53:23.010002 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:53:23.013764 unknown[962]: wrote ssh authorized keys file for user: core Jul 2 07:53:23.016603 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:53:23.026111 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:23.031084 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:53:23.099620 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 07:53:23.206003 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:23.211102 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:23.215526 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:23.215526 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:23.224428 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:23.229016 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:23.238384 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:23.238384 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:23.238384 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:23.256763 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (964) Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3323760824" Jul 2 07:53:23.256810 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3323760824": device or resource busy Jul 2 07:53:23.256810 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3323760824", trying btrfs: device or resource busy Jul 2 07:53:23.256810 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3323760824" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3323760824" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3323760824" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3323760824" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2968735613" Jul 2 07:53:23.311072 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2968735613": device or resource busy Jul 2 07:53:23.311072 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2968735613", trying btrfs: device or resource busy Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2968735613" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2968735613" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2968735613" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2968735613" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:53:23.311072 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:53:23.259627 systemd[1]: mnt-oem3323760824.mount: Deactivated successfully. Jul 2 07:53:23.389488 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Jul 2 07:53:23.277303 systemd[1]: mnt-oem2968735613.mount: Deactivated successfully. Jul 2 07:53:23.907722 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Jul 2 07:53:24.306473 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:53:24.306473 ignition[962]: INFO : files: op(13): [started] processing unit "waagent.service" Jul 2 07:53:24.306473 ignition[962]: INFO : files: op(13): [finished] processing unit "waagent.service" Jul 2 07:53:24.306473 ignition[962]: INFO : files: op(14): [started] processing unit "nvidia.service" Jul 2 07:53:24.306473 ignition[962]: INFO : files: op(14): [finished] processing unit "nvidia.service" Jul 2 07:53:24.306473 ignition[962]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:24.328407 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:24.328407 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:24.328407 ignition[962]: INFO : files: files passed Jul 2 07:53:24.328407 ignition[962]: INFO : Ignition finished successfully Jul 2 07:53:24.395893 kernel: audit: type=1130 audit(1719906804.336:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.329776 systemd[1]: Finished ignition-files.service. Jul 2 07:53:24.349562 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:53:24.356128 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:53:24.362131 systemd[1]: Starting ignition-quench.service... Jul 2 07:53:24.367823 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:53:24.367930 systemd[1]: Finished ignition-quench.service. Jul 2 07:53:24.412202 initrd-setup-root-after-ignition[987]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:53:24.416842 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:53:24.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.421778 systemd[1]: Reached target ignition-complete.target. Jul 2 07:53:24.426781 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:53:24.441408 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:53:24.441515 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:53:24.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.446329 systemd[1]: Reached target initrd-fs.target. Jul 2 07:53:24.452451 systemd[1]: Reached target initrd.target. Jul 2 07:53:24.456254 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:53:24.460209 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:53:24.470863 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:53:24.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.473794 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:53:24.486044 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:53:24.488262 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:53:24.492482 systemd[1]: Stopped target timers.target. Jul 2 07:53:24.496468 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:53:24.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.496618 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:53:24.500501 systemd[1]: Stopped target initrd.target. Jul 2 07:53:24.504856 systemd[1]: Stopped target basic.target. Jul 2 07:53:24.508769 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:53:24.512896 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:53:24.517094 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:53:24.521467 systemd[1]: Stopped target remote-fs.target. Jul 2 07:53:24.525506 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:53:24.529793 systemd[1]: Stopped target sysinit.target. Jul 2 07:53:24.533660 systemd[1]: Stopped target local-fs.target. Jul 2 07:53:24.538820 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:53:24.542866 systemd[1]: Stopped target swap.target. Jul 2 07:53:24.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.546444 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:53:24.546598 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:53:24.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.550540 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:53:24.554049 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:53:24.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.554195 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:53:24.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.558679 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:53:24.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.595148 ignition[1000]: INFO : Ignition 2.14.0 Jul 2 07:53:24.595148 ignition[1000]: INFO : Stage: umount Jul 2 07:53:24.595148 ignition[1000]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:24.595148 ignition[1000]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:53:24.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.558816 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:53:24.563215 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:53:24.563362 systemd[1]: Stopped ignition-files.service. Jul 2 07:53:24.567231 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:53:24.567357 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 07:53:24.572977 systemd[1]: Stopping ignition-mount.service... Jul 2 07:53:24.576206 systemd[1]: Stopping iscsiuio.service... Jul 2 07:53:24.577956 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:53:24.578103 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:53:24.581689 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:53:24.583540 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:53:24.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.583703 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:53:24.587164 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:53:24.587293 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:53:24.643461 ignition[1000]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:53:24.643461 ignition[1000]: INFO : umount: umount passed Jul 2 07:53:24.643461 ignition[1000]: INFO : Ignition finished successfully Jul 2 07:53:24.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.591657 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:53:24.597316 systemd[1]: Stopped iscsiuio.service. Jul 2 07:53:24.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.600424 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:53:24.600507 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:53:24.643455 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:53:24.643563 systemd[1]: Stopped ignition-mount.service. Jul 2 07:53:24.648522 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:53:24.648571 systemd[1]: Stopped ignition-disks.service. Jul 2 07:53:24.654035 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:53:24.654084 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:53:24.658274 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:53:24.658322 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:53:24.660277 systemd[1]: Stopped target network.target. Jul 2 07:53:24.662234 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:53:24.662278 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:53:24.668960 systemd[1]: Stopped target paths.target. Jul 2 07:53:24.670740 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:53:24.675966 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:53:24.705403 systemd[1]: Stopped target slices.target. Jul 2 07:53:24.709208 systemd[1]: Stopped target sockets.target. Jul 2 07:53:24.712968 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:53:24.713020 systemd[1]: Closed iscsid.socket. Jul 2 07:53:24.716972 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:53:24.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.717018 systemd[1]: Closed iscsiuio.socket. Jul 2 07:53:24.720288 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:53:24.720350 systemd[1]: Stopped ignition-setup.service. Jul 2 07:53:24.724676 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:53:24.734123 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:53:24.737065 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:53:24.740466 systemd-networkd[806]: eth0: DHCPv6 lease lost Jul 2 07:53:24.741521 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:53:24.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.741624 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:53:24.750000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:53:24.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.748473 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:53:24.748569 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:53:24.756000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:53:24.755191 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:53:24.755225 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:53:24.759665 systemd[1]: Stopping network-cleanup.service... Jul 2 07:53:24.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.770334 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:53:24.770403 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:53:24.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.772686 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:53:24.772730 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:53:24.776714 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:53:24.776762 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:53:24.779383 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:53:24.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.784951 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:53:24.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.785499 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:53:24.785635 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:53:24.790958 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:53:24.791010 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:53:24.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.796831 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:53:24.796875 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:53:24.800852 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:53:24.800900 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:53:24.804672 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:53:24.804720 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:53:24.847570 kernel: hv_netvsc 000d3ad9-7e72-000d-3ad9-7e72000d3ad9 eth0: Data path switched from VF: enP61865s1 Jul 2 07:53:24.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.806652 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:53:24.806693 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:53:24.822123 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:53:24.832995 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:53:24.833046 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:53:24.838373 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:53:24.838458 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:53:24.868902 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:53:24.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.869024 systemd[1]: Stopped network-cleanup.service. Jul 2 07:53:26.915376 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:53:26.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.915526 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:53:26.943415 kernel: kauditd_printk_skb: 39 callbacks suppressed Jul 2 07:53:26.943442 kernel: audit: type=1131 audit(1719906806.917:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.918183 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:53:26.941566 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:53:26.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.941639 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:53:26.963725 kernel: audit: type=1131 audit(1719906806.946:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.960534 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:53:26.975009 systemd[1]: Switching root. Jul 2 07:53:27.001556 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Jul 2 07:53:27.001617 iscsid[812]: iscsid shutting down. Jul 2 07:53:27.003243 systemd-journald[183]: Journal stopped Jul 2 07:53:40.223655 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:53:40.223683 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:53:40.223695 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:53:40.223705 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:53:40.223713 kernel: SELinux: policy capability open_perms=1 Jul 2 07:53:40.223723 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:53:40.223736 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:53:40.223749 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:53:40.223758 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:53:40.223767 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:53:40.223777 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:53:40.223785 kernel: audit: type=1403 audit(1719906809.410:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:53:40.223798 systemd[1]: Successfully loaded SELinux policy in 295.551ms. Jul 2 07:53:40.223811 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.857ms. Jul 2 07:53:40.223826 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:40.223839 systemd[1]: Detected virtualization microsoft. Jul 2 07:53:40.223848 systemd[1]: Detected architecture x86-64. Jul 2 07:53:40.223858 systemd[1]: Detected first boot. Jul 2 07:53:40.223871 systemd[1]: Hostname set to . Jul 2 07:53:40.223882 systemd[1]: Initializing machine ID from random generator. Jul 2 07:53:40.223892 kernel: audit: type=1400 audit(1719906810.146:81): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:40.223902 kernel: audit: type=1400 audit(1719906810.164:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:40.223924 kernel: audit: type=1400 audit(1719906810.164:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:40.223935 kernel: audit: type=1334 audit(1719906810.176:84): prog-id=10 op=LOAD Jul 2 07:53:40.223944 kernel: audit: type=1334 audit(1719906810.176:85): prog-id=10 op=UNLOAD Jul 2 07:53:40.223957 kernel: audit: type=1334 audit(1719906810.189:86): prog-id=11 op=LOAD Jul 2 07:53:40.223966 kernel: audit: type=1334 audit(1719906810.189:87): prog-id=11 op=UNLOAD Jul 2 07:53:40.223977 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:53:40.223986 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:53:40.223997 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:40.224009 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:40.224022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:40.224034 kernel: kauditd_printk_skb: 9 callbacks suppressed Jul 2 07:53:40.224045 kernel: audit: type=1334 audit(1719906819.734:90): prog-id=12 op=LOAD Jul 2 07:53:40.224058 kernel: audit: type=1334 audit(1719906819.734:91): prog-id=3 op=UNLOAD Jul 2 07:53:40.224067 kernel: audit: type=1334 audit(1719906819.739:92): prog-id=13 op=LOAD Jul 2 07:53:40.224077 kernel: audit: type=1334 audit(1719906819.743:93): prog-id=14 op=LOAD Jul 2 07:53:40.224088 kernel: audit: type=1334 audit(1719906819.743:94): prog-id=4 op=UNLOAD Jul 2 07:53:40.224099 kernel: audit: type=1334 audit(1719906819.743:95): prog-id=5 op=UNLOAD Jul 2 07:53:40.224108 kernel: audit: type=1334 audit(1719906819.748:96): prog-id=15 op=LOAD Jul 2 07:53:40.224123 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:53:40.224135 kernel: audit: type=1334 audit(1719906819.748:97): prog-id=12 op=UNLOAD Jul 2 07:53:40.224147 kernel: audit: type=1334 audit(1719906819.753:98): prog-id=16 op=LOAD Jul 2 07:53:40.224156 kernel: audit: type=1334 audit(1719906819.758:99): prog-id=17 op=LOAD Jul 2 07:53:40.224168 systemd[1]: Stopped iscsid.service. Jul 2 07:53:40.224178 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:53:40.224191 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:53:40.224201 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:40.224213 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:53:40.224230 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:53:40.224241 systemd[1]: Created slice system-getty.slice. Jul 2 07:53:40.224255 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:53:40.224270 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:53:40.224284 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:53:40.224305 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:53:40.224320 systemd[1]: Created slice user.slice. Jul 2 07:53:40.224333 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:40.224349 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:53:40.224359 systemd[1]: Set up automount boot.automount. Jul 2 07:53:40.224371 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:53:40.224380 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:53:40.224393 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:53:40.224403 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:53:40.224415 systemd[1]: Reached target integritysetup.target. Jul 2 07:53:40.224426 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:40.224440 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:40.224453 systemd[1]: Reached target slices.target. Jul 2 07:53:40.224465 systemd[1]: Reached target swap.target. Jul 2 07:53:40.224476 systemd[1]: Reached target torcx.target. Jul 2 07:53:40.224489 systemd[1]: Reached target veritysetup.target. Jul 2 07:53:40.224501 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:53:40.224515 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:53:40.224529 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:40.224542 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:40.224556 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:40.224572 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:53:40.224588 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:53:40.224604 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:53:40.224621 systemd[1]: Mounting media.mount... Jul 2 07:53:40.224641 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:40.224658 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:53:40.224674 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:53:40.224689 systemd[1]: Mounting tmp.mount... Jul 2 07:53:40.224700 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:53:40.224714 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:40.224727 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:40.224738 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:53:40.224749 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:40.224762 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:40.224774 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:40.224786 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:53:40.224796 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:40.224809 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:53:40.224822 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:53:40.224832 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:53:40.224845 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:53:40.224859 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:53:40.224871 systemd[1]: Stopped systemd-journald.service. Jul 2 07:53:40.224883 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:40.224895 kernel: loop: module loaded Jul 2 07:53:40.224905 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:40.224972 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:53:40.224985 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:53:40.224995 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:40.225007 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:53:40.225022 systemd[1]: Stopped verity-setup.service. Jul 2 07:53:40.225032 kernel: fuse: init (API version 7.34) Jul 2 07:53:40.225044 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:40.225057 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:53:40.225067 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:53:40.225079 systemd[1]: Mounted media.mount. Jul 2 07:53:40.225089 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:53:40.225106 systemd-journald[1139]: Journal started Jul 2 07:53:40.225156 systemd-journald[1139]: Runtime Journal (/run/log/journal/481280e29cc54a94a52a49b44188f66c) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:53:29.410000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:53:30.146000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:30.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:30.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:30.176000 audit: BPF prog-id=10 op=LOAD Jul 2 07:53:30.176000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:53:30.189000 audit: BPF prog-id=11 op=LOAD Jul 2 07:53:30.189000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:53:31.565000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:53:31.565000 audit[1034]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.565000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:31.572000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:53:31.572000 audit[1034]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.572000 audit: CWD cwd="/" Jul 2 07:53:31.572000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:31.572000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:31.572000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:39.734000 audit: BPF prog-id=12 op=LOAD Jul 2 07:53:39.734000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:53:39.739000 audit: BPF prog-id=13 op=LOAD Jul 2 07:53:39.743000 audit: BPF prog-id=14 op=LOAD Jul 2 07:53:39.743000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:53:39.743000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:53:39.748000 audit: BPF prog-id=15 op=LOAD Jul 2 07:53:39.748000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:53:39.753000 audit: BPF prog-id=16 op=LOAD Jul 2 07:53:39.758000 audit: BPF prog-id=17 op=LOAD Jul 2 07:53:39.758000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:53:39.758000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:53:39.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.796000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:53:39.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:39.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.133000 audit: BPF prog-id=18 op=LOAD Jul 2 07:53:40.133000 audit: BPF prog-id=19 op=LOAD Jul 2 07:53:40.133000 audit: BPF prog-id=20 op=LOAD Jul 2 07:53:40.133000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:53:40.133000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:53:40.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.219000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:53:40.219000 audit[1139]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcd837d4b0 a2=4000 a3=7ffcd837d54c items=0 ppid=1 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.219000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:53:39.733508 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:53:31.539779 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:39.759862 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:53:31.540167 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:31.540191 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:31.540231 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:53:31.540243 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:53:31.540288 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:53:31.540304 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:53:31.540527 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:53:31.540583 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:31.540600 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:31.553611 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:53:31.553665 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:53:31.553693 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:53:31.553712 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:53:31.553731 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:53:31.553743 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:53:38.664909 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:38.665198 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:38.665297 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:38.665466 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:38.665513 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:53:38.665567 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-07-02T07:53:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:53:40.234271 systemd[1]: Started systemd-journald.service. Jul 2 07:53:40.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.236729 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:53:40.239110 systemd[1]: Mounted tmp.mount. Jul 2 07:53:40.240983 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:53:40.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.243253 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:40.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.245498 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:53:40.245638 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:53:40.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.248141 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:40.248325 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:40.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.250798 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:40.251107 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:40.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.253490 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:40.253643 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:40.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.256270 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:53:40.256502 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:53:40.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.259006 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:40.259230 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:40.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.261710 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:53:40.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.264361 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:53:40.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.267211 systemd[1]: Reached target network-pre.target. Jul 2 07:53:40.270627 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:53:40.274294 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:53:40.278956 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:53:40.280741 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:53:40.284352 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:53:40.286597 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:40.287657 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:53:40.290018 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:40.291128 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:53:40.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.298010 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:40.301219 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:53:40.304005 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:53:40.321959 systemd-journald[1139]: Time spent on flushing to /var/log/journal/481280e29cc54a94a52a49b44188f66c is 38.664ms for 1153 entries. Jul 2 07:53:40.321959 systemd-journald[1139]: System Journal (/var/log/journal/481280e29cc54a94a52a49b44188f66c) is 8.0M, max 2.6G, 2.6G free. Jul 2 07:53:40.568243 systemd-journald[1139]: Received client request to flush runtime journal. Jul 2 07:53:40.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:40.308889 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:40.345212 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:53:40.347745 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:53:40.569490 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:53:40.385128 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:40.401525 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:40.405270 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:53:40.569738 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:53:40.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.030854 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:53:41.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.675819 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:53:41.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.677000 audit: BPF prog-id=21 op=LOAD Jul 2 07:53:41.677000 audit: BPF prog-id=22 op=LOAD Jul 2 07:53:41.677000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:53:41.677000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:53:41.679585 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:41.698163 systemd-udevd[1160]: Using default interface naming scheme 'v252'. Jul 2 07:53:41.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.907000 audit: BPF prog-id=23 op=LOAD Jul 2 07:53:41.904499 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:41.909655 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:41.942939 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:53:42.001955 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:53:42.022000 audit: BPF prog-id=24 op=LOAD Jul 2 07:53:42.023000 audit: BPF prog-id=25 op=LOAD Jul 2 07:53:42.023000 audit: BPF prog-id=26 op=LOAD Jul 2 07:53:42.025237 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:53:42.036401 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 07:53:42.036472 kernel: hv_vmbus: registering driver hv_utils Jul 2 07:53:42.055030 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 07:53:42.020000 audit[1176]: AVC avc: denied { confidentiality } for pid=1176 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:42.068928 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 07:53:42.074933 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 07:53:42.085017 kernel: Console: switching to colour dummy device 80x25 Jul 2 07:53:42.093624 kernel: hv_vmbus: registering driver hv_balloon Jul 2 07:53:42.093699 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:53:42.094036 systemd[1]: Started systemd-userdbd.service. Jul 2 07:53:42.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.103832 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 07:53:42.103929 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 07:53:42.104004 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 07:53:42.106934 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 07:53:42.020000 audit[1176]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555aa3ae59f0 a1=f884 a2=7f86a3b35bc5 a3=5 items=12 ppid=1160 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.020000 audit: CWD cwd="/" Jul 2 07:53:42.020000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=1 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=2 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=3 name=(null) inode=14915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=4 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=5 name=(null) inode=14916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=6 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=7 name=(null) inode=14917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=8 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=9 name=(null) inode=14918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=10 name=(null) inode=14914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PATH item=11 name=(null) inode=14919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:42.020000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:53:42.764132 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1161) Jul 2 07:53:42.798132 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Jul 2 07:53:42.841039 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:42.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.864505 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:53:42.868794 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:53:42.904811 systemd-networkd[1174]: lo: Link UP Jul 2 07:53:42.904821 systemd-networkd[1174]: lo: Gained carrier Jul 2 07:53:42.905481 systemd-networkd[1174]: Enumeration completed Jul 2 07:53:42.905588 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:42.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.909387 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:53:42.942647 systemd-networkd[1174]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:42.997124 kernel: mlx5_core f1a9:00:02.0 enP61865s1: Link up Jul 2 07:53:43.018130 kernel: hv_netvsc 000d3ad9-7e72-000d-3ad9-7e72000d3ad9 eth0: Data path switched to VF: enP61865s1 Jul 2 07:53:43.019573 systemd-networkd[1174]: enP61865s1: Link UP Jul 2 07:53:43.019764 systemd-networkd[1174]: eth0: Link UP Jul 2 07:53:43.019777 systemd-networkd[1174]: eth0: Gained carrier Jul 2 07:53:43.025371 systemd-networkd[1174]: enP61865s1: Gained carrier Jul 2 07:53:43.049238 systemd-networkd[1174]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:53:43.135577 lvm[1236]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:43.176311 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:53:43.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.179071 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:43.182969 systemd[1]: Starting lvm2-activation.service... Jul 2 07:53:43.187727 lvm[1239]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:43.206130 systemd[1]: Finished lvm2-activation.service. Jul 2 07:53:43.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.208587 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:43.210913 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:53:43.210948 systemd[1]: Reached target local-fs.target. Jul 2 07:53:43.213134 systemd[1]: Reached target machines.target. Jul 2 07:53:43.216571 systemd[1]: Starting ldconfig.service... Jul 2 07:53:43.218693 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.218804 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:43.220012 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:53:43.223374 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:53:43.227585 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:53:43.231451 systemd[1]: Starting systemd-sysext.service... Jul 2 07:53:43.251939 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1241 (bootctl) Jul 2 07:53:43.253386 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:53:43.267109 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:53:43.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.321290 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:53:43.328509 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:53:43.329778 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:53:43.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.349518 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:43.349729 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:53:43.390151 kernel: loop0: detected capacity change from 0 to 211296 Jul 2 07:53:43.468308 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:53:43.484120 kernel: loop1: detected capacity change from 0 to 211296 Jul 2 07:53:43.488515 (sd-sysext)[1253]: Using extensions 'kubernetes'. Jul 2 07:53:43.488956 (sd-sysext)[1253]: Merged extensions into '/usr'. Jul 2 07:53:43.504959 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.506509 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:53:43.508855 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.512197 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:43.514649 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:43.516770 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:43.517758 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.517913 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:43.518049 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.522153 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:53:43.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.523451 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:43.523631 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:43.524936 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:43.525090 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:43.525901 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:43.526026 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:43.527500 systemd[1]: Finished systemd-sysext.service. Jul 2 07:53:43.529456 systemd[1]: Starting ensure-sysext.service... Jul 2 07:53:43.529630 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:43.529712 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.535185 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:53:43.541685 systemd[1]: Reloading. Jul 2 07:53:43.611908 /usr/lib/systemd/system-generators/torcx-generator[1280]: time="2024-07-02T07:53:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:43.611947 /usr/lib/systemd/system-generators/torcx-generator[1280]: time="2024-07-02T07:53:43Z" level=info msg="torcx already run" Jul 2 07:53:43.700447 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:43.700466 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:43.717601 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:43.724833 systemd-tmpfiles[1260]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:53:43.782000 audit: BPF prog-id=27 op=LOAD Jul 2 07:53:43.782000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:53:43.782000 audit: BPF prog-id=28 op=LOAD Jul 2 07:53:43.782000 audit: BPF prog-id=29 op=LOAD Jul 2 07:53:43.783000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:53:43.783000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:53:43.784000 audit: BPF prog-id=30 op=LOAD Jul 2 07:53:43.784000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:53:43.784000 audit: BPF prog-id=31 op=LOAD Jul 2 07:53:43.784000 audit: BPF prog-id=32 op=LOAD Jul 2 07:53:43.784000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:53:43.784000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:53:43.786000 audit: BPF prog-id=33 op=LOAD Jul 2 07:53:43.786000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:53:43.786000 audit: BPF prog-id=34 op=LOAD Jul 2 07:53:43.786000 audit: BPF prog-id=35 op=LOAD Jul 2 07:53:43.786000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:53:43.786000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:53:43.801416 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.801686 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.803034 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:43.805446 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:43.808340 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:43.809413 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.809623 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:43.809855 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.813722 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:43.813886 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:43.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.815325 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:43.815435 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:43.819442 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:43.819679 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:43.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.821721 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.821970 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.823091 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:43.826453 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:43.828797 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:43.830525 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.830607 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:43.830694 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:43.830809 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:43.831527 systemd[1]: Finished ensure-sysext.service. Jul 2 07:53:43.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.832956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:43.833359 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:43.834826 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:43.834933 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:43.835356 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:43.837154 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:43.837267 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:43.852491 systemd-tmpfiles[1260]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:53:43.919881 systemd-tmpfiles[1260]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:53:44.030112 systemd-fsck[1248]: fsck.fat 4.2 (2021-01-31) Jul 2 07:53:44.030112 systemd-fsck[1248]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:53:44.032561 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:53:44.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.037343 systemd[1]: Mounting boot.mount... Jul 2 07:53:44.051672 systemd[1]: Mounted boot.mount. Jul 2 07:53:44.065698 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:53:44.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.389407 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:53:44.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.393798 systemd[1]: Starting audit-rules.service... Jul 2 07:53:44.397585 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:53:44.401176 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:53:44.403000 audit: BPF prog-id=36 op=LOAD Jul 2 07:53:44.405882 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:44.408000 audit: BPF prog-id=37 op=LOAD Jul 2 07:53:44.410291 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:53:44.413993 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:53:44.431202 systemd-networkd[1174]: eth0: Gained IPv6LL Jul 2 07:53:44.433568 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:53:44.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.444394 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:53:44.447164 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:44.462000 audit[1359]: SYSTEM_BOOT pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.465686 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:53:44.556857 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:53:44.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.559474 systemd[1]: Reached target time-set.target. Jul 2 07:53:44.585745 systemd-resolved[1357]: Positive Trust Anchors: Jul 2 07:53:44.585786 systemd-resolved[1357]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:44.585927 systemd-resolved[1357]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:44.596196 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:53:44.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:44.635757 augenrules[1374]: No rules Jul 2 07:53:44.634000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:53:44.634000 audit[1374]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9aa527a0 a2=420 a3=0 items=0 ppid=1353 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:44.634000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:53:44.636625 systemd[1]: Finished audit-rules.service. Jul 2 07:53:44.660972 systemd-resolved[1357]: Using system hostname 'ci-3510.3.5-a-cc7572d280'. Jul 2 07:53:44.662592 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:44.665511 systemd[1]: Reached target network.target. Jul 2 07:53:44.667634 systemd[1]: Reached target network-online.target. Jul 2 07:53:44.670043 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:44.764927 systemd-timesyncd[1358]: Contacted time server 193.1.8.106:123 (0.flatcar.pool.ntp.org). Jul 2 07:53:44.765007 systemd-timesyncd[1358]: Initial clock synchronization to Tue 2024-07-02 07:53:44.764659 UTC. Jul 2 07:53:49.504710 ldconfig[1240]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:53:49.514628 systemd[1]: Finished ldconfig.service. Jul 2 07:53:49.518508 systemd[1]: Starting systemd-update-done.service... Jul 2 07:53:49.527137 systemd[1]: Finished systemd-update-done.service. Jul 2 07:53:49.529535 systemd[1]: Reached target sysinit.target. Jul 2 07:53:49.531680 systemd[1]: Started motdgen.path. Jul 2 07:53:49.533451 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:53:49.536421 systemd[1]: Started logrotate.timer. Jul 2 07:53:49.538688 systemd[1]: Started mdadm.timer. Jul 2 07:53:49.540331 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:53:49.542598 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:53:49.542635 systemd[1]: Reached target paths.target. Jul 2 07:53:49.544578 systemd[1]: Reached target timers.target. Jul 2 07:53:49.546796 systemd[1]: Listening on dbus.socket. Jul 2 07:53:49.549808 systemd[1]: Starting docker.socket... Jul 2 07:53:49.554238 systemd[1]: Listening on sshd.socket. Jul 2 07:53:49.556190 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:49.556636 systemd[1]: Listening on docker.socket. Jul 2 07:53:49.558544 systemd[1]: Reached target sockets.target. Jul 2 07:53:49.560589 systemd[1]: Reached target basic.target. Jul 2 07:53:49.562536 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:49.562569 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:49.563613 systemd[1]: Starting containerd.service... Jul 2 07:53:49.567776 systemd[1]: Starting dbus.service... Jul 2 07:53:49.570410 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:53:49.573518 systemd[1]: Starting extend-filesystems.service... Jul 2 07:53:49.575399 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:53:49.587143 systemd[1]: Starting kubelet.service... Jul 2 07:53:49.590633 systemd[1]: Starting motdgen.service... Jul 2 07:53:49.593932 systemd[1]: Started nvidia.service. Jul 2 07:53:49.597390 systemd[1]: Starting prepare-helm.service... Jul 2 07:53:49.600877 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:53:49.604450 systemd[1]: Starting sshd-keygen.service... Jul 2 07:53:49.609611 systemd[1]: Starting systemd-logind.service... Jul 2 07:53:49.612392 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:49.612502 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:53:49.613288 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:53:49.615024 systemd[1]: Starting update-engine.service... Jul 2 07:53:49.621901 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:53:49.630257 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:53:49.630503 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:53:49.669063 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:53:49.669298 systemd[1]: Finished motdgen.service. Jul 2 07:53:49.693895 extend-filesystems[1385]: Found loop1 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda1 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda2 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda3 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found usr Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda4 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda6 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda7 Jul 2 07:53:49.696992 extend-filesystems[1385]: Found sda9 Jul 2 07:53:49.723605 extend-filesystems[1385]: Checking size of /dev/sda9 Jul 2 07:53:49.714234 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:53:49.726330 jq[1401]: true Jul 2 07:53:49.726448 jq[1384]: false Jul 2 07:53:49.714443 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:53:49.745828 jq[1418]: true Jul 2 07:53:49.742377 systemd-logind[1395]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:53:49.748238 systemd-logind[1395]: New seat seat0. Jul 2 07:53:49.758551 env[1407]: time="2024-07-02T07:53:49.758270501Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:53:49.819321 dbus-daemon[1383]: [system] SELinux support is enabled Jul 2 07:53:49.819543 systemd[1]: Started dbus.service. Jul 2 07:53:49.824804 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:53:49.824843 systemd[1]: Reached target system-config.target. Jul 2 07:53:49.827550 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:53:49.827593 systemd[1]: Reached target user-config.target. Jul 2 07:53:49.829830 extend-filesystems[1385]: Old size kept for /dev/sda9 Jul 2 07:53:49.831954 systemd[1]: Started systemd-logind.service. Jul 2 07:53:49.844636 env[1407]: time="2024-07-02T07:53:49.841661928Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:53:49.844636 env[1407]: time="2024-07-02T07:53:49.841862526Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.832467 dbus-daemon[1383]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:53:49.850586 extend-filesystems[1385]: Found sr0 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857167202Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857217202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857533299Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857553499Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857572099Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857586099Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857677598Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.857945196Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.858148894Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:49.875815 env[1407]: time="2024-07-02T07:53:49.858170294Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:53:49.852372 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:53:49.876306 env[1407]: time="2024-07-02T07:53:49.858233294Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:53:49.876306 env[1407]: time="2024-07-02T07:53:49.858249494Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:53:49.852573 systemd[1]: Finished extend-filesystems.service. Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894576900Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894628300Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894647699Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894703899Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894739299Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894821498Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894840398Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894858998Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894877898Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894898097Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894922597Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.894942797Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.895064396Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:53:49.897006 env[1407]: time="2024-07-02T07:53:49.895201795Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895635791Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895683891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895704591Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895772790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895791090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895808190Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895874790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895893089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895913289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895930289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895947589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.895965589Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.896107488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.896127087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.897583 env[1407]: time="2024-07-02T07:53:49.896145887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.898120 env[1407]: time="2024-07-02T07:53:49.896162687Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:53:49.898120 env[1407]: time="2024-07-02T07:53:49.896183687Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:53:49.898120 env[1407]: time="2024-07-02T07:53:49.896199287Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:53:49.898120 env[1407]: time="2024-07-02T07:53:49.896222087Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:53:49.898120 env[1407]: time="2024-07-02T07:53:49.896270786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:53:49.898313 env[1407]: time="2024-07-02T07:53:49.896536984Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:53:49.898313 env[1407]: time="2024-07-02T07:53:49.896609084Z" level=info msg="Connect containerd service" Jul 2 07:53:49.898313 env[1407]: time="2024-07-02T07:53:49.896654083Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.901383645Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.901724842Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.902020340Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.905847109Z" level=info msg="containerd successfully booted in 0.168862s" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.910679570Z" level=info msg="Start subscribing containerd event" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.910791569Z" level=info msg="Start recovering state" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.910909568Z" level=info msg="Start event monitor" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.910928468Z" level=info msg="Start snapshots syncer" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.911041567Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:53:49.926118 env[1407]: time="2024-07-02T07:53:49.911058367Z" level=info msg="Start streaming server" Jul 2 07:53:49.937839 bash[1437]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:53:49.902183 systemd[1]: Started containerd.service. Jul 2 07:53:49.938040 tar[1405]: linux-amd64/helm Jul 2 07:53:49.926023 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:53:49.948454 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 07:53:50.518122 update_engine[1396]: I0702 07:53:50.517691 1396 main.cc:92] Flatcar Update Engine starting Jul 2 07:53:50.566027 systemd[1]: Started update-engine.service. Jul 2 07:53:50.571496 systemd[1]: Started locksmithd.service. Jul 2 07:53:50.585663 update_engine[1396]: I0702 07:53:50.585520 1396 update_check_scheduler.cc:74] Next update check in 4m0s Jul 2 07:53:50.693435 tar[1405]: linux-amd64/LICENSE Jul 2 07:53:50.693707 tar[1405]: linux-amd64/README.md Jul 2 07:53:50.700871 systemd[1]: Finished prepare-helm.service. Jul 2 07:53:51.004681 systemd[1]: Started kubelet.service. Jul 2 07:53:51.066469 sshd_keygen[1402]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:53:51.094304 systemd[1]: Finished sshd-keygen.service. Jul 2 07:53:51.099485 systemd[1]: Starting issuegen.service... Jul 2 07:53:51.102905 systemd[1]: Started waagent.service. Jul 2 07:53:51.109323 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:53:51.109502 systemd[1]: Finished issuegen.service. Jul 2 07:53:51.113736 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:53:51.122992 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:53:51.127043 systemd[1]: Started getty@tty1.service. Jul 2 07:53:51.130891 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:53:51.134218 systemd[1]: Reached target getty.target. Jul 2 07:53:51.136514 systemd[1]: Reached target multi-user.target. Jul 2 07:53:51.140572 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:53:51.153730 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:53:51.153897 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:53:51.156726 systemd[1]: Startup finished in 853ms (firmware) + 25.431s (loader) + 949ms (kernel) + 15.143s (initrd) + 21.864s (userspace) = 1min 4.242s. Jul 2 07:53:51.504450 login[1505]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:53:51.506040 login[1506]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:53:51.528691 systemd[1]: Created slice user-500.slice. Jul 2 07:53:51.531304 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:53:51.537120 systemd-logind[1395]: New session 1 of user core. Jul 2 07:53:51.542865 systemd-logind[1395]: New session 2 of user core. Jul 2 07:53:51.547936 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:53:51.551294 systemd[1]: Starting user@500.service... Jul 2 07:53:51.565590 (systemd)[1517]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:51.736085 systemd[1517]: Queued start job for default target default.target. Jul 2 07:53:51.737317 systemd[1517]: Reached target paths.target. Jul 2 07:53:51.737351 systemd[1517]: Reached target sockets.target. Jul 2 07:53:51.737367 systemd[1517]: Reached target timers.target. Jul 2 07:53:51.737383 systemd[1517]: Reached target basic.target. Jul 2 07:53:51.737438 systemd[1517]: Reached target default.target. Jul 2 07:53:51.737473 systemd[1517]: Startup finished in 164ms. Jul 2 07:53:51.737521 systemd[1]: Started user@500.service. Jul 2 07:53:51.738728 systemd[1]: Started session-1.scope. Jul 2 07:53:51.739597 systemd[1]: Started session-2.scope. Jul 2 07:53:51.746623 kubelet[1491]: E0702 07:53:51.746566 1491 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:51.756896 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:51.757059 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:51.757357 systemd[1]: kubelet.service: Consumed 1.076s CPU time. Jul 2 07:53:52.085559 locksmithd[1487]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:53:56.935418 waagent[1500]: 2024-07-02T07:53:56.935297Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 07:53:56.939674 waagent[1500]: 2024-07-02T07:53:56.939578Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 07:53:56.942472 waagent[1500]: 2024-07-02T07:53:56.942397Z INFO Daemon Daemon Python: 3.9.16 Jul 2 07:53:56.945294 waagent[1500]: 2024-07-02T07:53:56.945215Z INFO Daemon Daemon Run daemon Jul 2 07:53:56.947866 waagent[1500]: 2024-07-02T07:53:56.947801Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 07:53:56.961482 waagent[1500]: 2024-07-02T07:53:56.961348Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.963903Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.965277Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.966143Z INFO Daemon Daemon Using waagent for provisioning Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.967589Z INFO Daemon Daemon Activate resource disk Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.968413Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.976252Z INFO Daemon Daemon Found device: None Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.977171Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.978255Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.980047Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:53:56.988215 waagent[1500]: 2024-07-02T07:53:56.981147Z INFO Daemon Daemon Running default provisioning handler Jul 2 07:53:57.001576 waagent[1500]: 2024-07-02T07:53:57.001430Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:53:57.008524 waagent[1500]: 2024-07-02T07:53:57.008404Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:53:57.017624 waagent[1500]: 2024-07-02T07:53:57.008819Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:53:57.017624 waagent[1500]: 2024-07-02T07:53:57.009751Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 07:53:57.076062 waagent[1500]: 2024-07-02T07:53:57.074340Z INFO Daemon Daemon Successfully mounted dvd Jul 2 07:53:57.126894 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 07:53:57.145502 waagent[1500]: 2024-07-02T07:53:57.145371Z INFO Daemon Daemon Detect protocol endpoint Jul 2 07:53:57.164947 waagent[1500]: 2024-07-02T07:53:57.145942Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:53:57.164947 waagent[1500]: 2024-07-02T07:53:57.147142Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 07:53:57.164947 waagent[1500]: 2024-07-02T07:53:57.148018Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 07:53:57.164947 waagent[1500]: 2024-07-02T07:53:57.149217Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 07:53:57.164947 waagent[1500]: 2024-07-02T07:53:57.149911Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 07:53:57.243198 waagent[1500]: 2024-07-02T07:53:57.243053Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 07:53:57.247442 waagent[1500]: 2024-07-02T07:53:57.247394Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 07:53:57.250439 waagent[1500]: 2024-07-02T07:53:57.250381Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 07:53:57.731434 waagent[1500]: 2024-07-02T07:53:57.731271Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 07:53:57.742599 waagent[1500]: 2024-07-02T07:53:57.742510Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 07:53:57.747829 waagent[1500]: 2024-07-02T07:53:57.742937Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 07:53:57.824863 waagent[1500]: 2024-07-02T07:53:57.824736Z INFO Daemon Daemon Found private key matching thumbprint F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA Jul 2 07:53:57.829331 waagent[1500]: 2024-07-02T07:53:57.829209Z INFO Daemon Daemon Certificate with thumbprint C13193DFFA6CBDE070FA20B21C5E1CB65CD1F3D7 has no matching private key. Jul 2 07:53:57.835932 waagent[1500]: 2024-07-02T07:53:57.829591Z INFO Daemon Daemon Fetch goal state completed Jul 2 07:53:57.876717 waagent[1500]: 2024-07-02T07:53:57.876636Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 374af7a9-b939-48e5-b892-cd98112f3077 New eTag: 6744257972453528749] Jul 2 07:53:57.882569 waagent[1500]: 2024-07-02T07:53:57.882502Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:53:57.894660 waagent[1500]: 2024-07-02T07:53:57.894596Z INFO Daemon Daemon Starting provisioning Jul 2 07:53:57.897651 waagent[1500]: 2024-07-02T07:53:57.897589Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 07:53:57.901468 waagent[1500]: 2024-07-02T07:53:57.901409Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-cc7572d280] Jul 2 07:53:57.935613 waagent[1500]: 2024-07-02T07:53:57.935468Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-cc7572d280] Jul 2 07:53:57.939711 waagent[1500]: 2024-07-02T07:53:57.939624Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 07:53:57.943473 waagent[1500]: 2024-07-02T07:53:57.943400Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 07:53:57.958319 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 07:53:57.958597 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 07:53:57.958671 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 07:53:57.959000 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:53:57.962152 systemd-networkd[1174]: eth0: DHCPv6 lease lost Jul 2 07:53:57.963481 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:53:57.963640 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:53:57.966018 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:57.997874 systemd-networkd[1561]: enP61865s1: Link UP Jul 2 07:53:57.997884 systemd-networkd[1561]: enP61865s1: Gained carrier Jul 2 07:53:57.999254 systemd-networkd[1561]: eth0: Link UP Jul 2 07:53:57.999263 systemd-networkd[1561]: eth0: Gained carrier Jul 2 07:53:57.999682 systemd-networkd[1561]: lo: Link UP Jul 2 07:53:57.999691 systemd-networkd[1561]: lo: Gained carrier Jul 2 07:53:58.000001 systemd-networkd[1561]: eth0: Gained IPv6LL Jul 2 07:53:58.000282 systemd-networkd[1561]: Enumeration completed Jul 2 07:53:58.004555 waagent[1500]: 2024-07-02T07:53:58.001743Z INFO Daemon Daemon Create user account if not exists Jul 2 07:53:58.004555 waagent[1500]: 2024-07-02T07:53:58.002405Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 07:53:58.004555 waagent[1500]: 2024-07-02T07:53:58.003478Z INFO Daemon Daemon Configure sudoer Jul 2 07:53:58.000376 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:58.005820 waagent[1500]: 2024-07-02T07:53:58.005760Z INFO Daemon Daemon Configure sshd Jul 2 07:53:58.006654 waagent[1500]: 2024-07-02T07:53:58.006603Z INFO Daemon Daemon Deploy ssh public key. Jul 2 07:53:58.011230 systemd-networkd[1561]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:58.016864 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:53:58.061244 systemd-networkd[1561]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:53:58.066240 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:53:59.330558 waagent[1500]: 2024-07-02T07:53:59.330456Z INFO Daemon Daemon Provisioning complete Jul 2 07:53:59.347626 waagent[1500]: 2024-07-02T07:53:59.347547Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 07:53:59.350825 waagent[1500]: 2024-07-02T07:53:59.350751Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 07:53:59.356542 waagent[1500]: 2024-07-02T07:53:59.356478Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 07:53:59.623967 waagent[1570]: 2024-07-02T07:53:59.623859Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 07:53:59.624764 waagent[1570]: 2024-07-02T07:53:59.624698Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:53:59.624910 waagent[1570]: 2024-07-02T07:53:59.624856Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:53:59.636156 waagent[1570]: 2024-07-02T07:53:59.636073Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 07:53:59.636311 waagent[1570]: 2024-07-02T07:53:59.636258Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 07:53:59.697612 waagent[1570]: 2024-07-02T07:53:59.697480Z INFO ExtHandler ExtHandler Found private key matching thumbprint F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA Jul 2 07:53:59.697851 waagent[1570]: 2024-07-02T07:53:59.697785Z INFO ExtHandler ExtHandler Certificate with thumbprint C13193DFFA6CBDE070FA20B21C5E1CB65CD1F3D7 has no matching private key. Jul 2 07:53:59.698088 waagent[1570]: 2024-07-02T07:53:59.698036Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 07:53:59.712282 waagent[1570]: 2024-07-02T07:53:59.712223Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: dc7d0724-ff6e-4ad5-9381-44d81fd940fa New eTag: 6744257972453528749] Jul 2 07:53:59.712812 waagent[1570]: 2024-07-02T07:53:59.712753Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:53:59.913074 waagent[1570]: 2024-07-02T07:53:59.912811Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:53:59.933840 waagent[1570]: 2024-07-02T07:53:59.933739Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1570 Jul 2 07:53:59.937327 waagent[1570]: 2024-07-02T07:53:59.937256Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:53:59.938565 waagent[1570]: 2024-07-02T07:53:59.938507Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:54:00.107252 waagent[1570]: 2024-07-02T07:54:00.106634Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:54:00.109520 waagent[1570]: 2024-07-02T07:54:00.109450Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:54:00.117871 waagent[1570]: 2024-07-02T07:54:00.117813Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:54:00.118368 waagent[1570]: 2024-07-02T07:54:00.118307Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:54:00.119456 waagent[1570]: 2024-07-02T07:54:00.119392Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 07:54:00.120725 waagent[1570]: 2024-07-02T07:54:00.120666Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:54:00.121155 waagent[1570]: 2024-07-02T07:54:00.121078Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:00.121787 waagent[1570]: 2024-07-02T07:54:00.121731Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:00.121886 waagent[1570]: 2024-07-02T07:54:00.121820Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:54:00.122041 waagent[1570]: 2024-07-02T07:54:00.121995Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:00.122781 waagent[1570]: 2024-07-02T07:54:00.122724Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:54:00.122928 waagent[1570]: 2024-07-02T07:54:00.122880Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:00.123658 waagent[1570]: 2024-07-02T07:54:00.123600Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:54:00.123946 waagent[1570]: 2024-07-02T07:54:00.123889Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:54:00.124404 waagent[1570]: 2024-07-02T07:54:00.124353Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:54:00.124657 waagent[1570]: 2024-07-02T07:54:00.124598Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:54:00.124657 waagent[1570]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:54:00.124657 waagent[1570]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:54:00.124657 waagent[1570]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:54:00.124657 waagent[1570]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:00.124657 waagent[1570]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:00.124657 waagent[1570]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:00.124913 waagent[1570]: 2024-07-02T07:54:00.124868Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:54:00.125184 waagent[1570]: 2024-07-02T07:54:00.125136Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:54:00.126273 waagent[1570]: 2024-07-02T07:54:00.126215Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:54:00.129238 waagent[1570]: 2024-07-02T07:54:00.128969Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:54:00.131012 waagent[1570]: 2024-07-02T07:54:00.130927Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:54:00.144379 waagent[1570]: 2024-07-02T07:54:00.144320Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 07:54:00.144934 waagent[1570]: 2024-07-02T07:54:00.144885Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:54:00.145756 waagent[1570]: 2024-07-02T07:54:00.145700Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 07:54:00.167972 waagent[1570]: 2024-07-02T07:54:00.167807Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1561' Jul 2 07:54:00.189819 waagent[1570]: 2024-07-02T07:54:00.189749Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 07:54:00.253863 waagent[1570]: 2024-07-02T07:54:00.253772Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 07:54:00.253863 waagent[1570]: Executing ['ip', '-a', '-o', 'link']: Jul 2 07:54:00.253863 waagent[1570]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 07:54:00.253863 waagent[1570]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d9:7e:72 brd ff:ff:ff:ff:ff:ff Jul 2 07:54:00.253863 waagent[1570]: 3: enP61865s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d9:7e:72 brd ff:ff:ff:ff:ff:ff\ altname enP61865p0s2 Jul 2 07:54:00.253863 waagent[1570]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 07:54:00.253863 waagent[1570]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 07:54:00.253863 waagent[1570]: 2: eth0 inet 10.200.8.38/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 07:54:00.253863 waagent[1570]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 07:54:00.253863 waagent[1570]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 07:54:00.253863 waagent[1570]: 2: eth0 inet6 fe80::20d:3aff:fed9:7e72/64 scope link \ valid_lft forever preferred_lft forever Jul 2 07:54:00.454902 waagent[1570]: 2024-07-02T07:54:00.454768Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 07:54:01.361426 waagent[1500]: 2024-07-02T07:54:01.361256Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 07:54:01.366827 waagent[1500]: 2024-07-02T07:54:01.366753Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 07:54:01.862441 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:54:01.862767 systemd[1]: Stopped kubelet.service. Jul 2 07:54:01.862831 systemd[1]: kubelet.service: Consumed 1.076s CPU time. Jul 2 07:54:01.864972 systemd[1]: Starting kubelet.service... Jul 2 07:54:02.560636 systemd[1]: Started kubelet.service. Jul 2 07:54:02.806239 kubelet[1615]: E0702 07:54:02.806179 1615 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:02.811355 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:02.811530 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:02.947815 waagent[1608]: 2024-07-02T07:54:02.947703Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 07:54:02.948563 waagent[1608]: 2024-07-02T07:54:02.948492Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 07:54:02.948710 waagent[1608]: 2024-07-02T07:54:02.948656Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 07:54:02.948860 waagent[1608]: 2024-07-02T07:54:02.948812Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Jul 2 07:54:02.958584 waagent[1608]: 2024-07-02T07:54:02.958478Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:54:02.958976 waagent[1608]: 2024-07-02T07:54:02.958916Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:02.959174 waagent[1608]: 2024-07-02T07:54:02.959122Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:02.971310 waagent[1608]: 2024-07-02T07:54:02.971234Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 07:54:02.984086 waagent[1608]: 2024-07-02T07:54:02.984024Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 07:54:02.985007 waagent[1608]: 2024-07-02T07:54:02.984946Z INFO ExtHandler Jul 2 07:54:02.985178 waagent[1608]: 2024-07-02T07:54:02.985119Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 9f012bd4-b36f-42c5-948e-6b23d684c4c8 eTag: 6744257972453528749 source: Fabric] Jul 2 07:54:02.985865 waagent[1608]: 2024-07-02T07:54:02.985807Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 07:54:02.986951 waagent[1608]: 2024-07-02T07:54:02.986891Z INFO ExtHandler Jul 2 07:54:02.987085 waagent[1608]: 2024-07-02T07:54:02.987036Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 07:54:02.993606 waagent[1608]: 2024-07-02T07:54:02.993552Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 07:54:02.994029 waagent[1608]: 2024-07-02T07:54:02.993982Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:54:03.013377 waagent[1608]: 2024-07-02T07:54:03.013314Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 07:54:03.078872 waagent[1608]: 2024-07-02T07:54:03.078669Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F8DDC07CD4C1A7B2B106457B40CA7538E6D2A7CA', 'hasPrivateKey': True} Jul 2 07:54:03.079854 waagent[1608]: 2024-07-02T07:54:03.079775Z INFO ExtHandler Downloaded certificate {'thumbprint': 'C13193DFFA6CBDE070FA20B21C5E1CB65CD1F3D7', 'hasPrivateKey': False} Jul 2 07:54:03.080875 waagent[1608]: 2024-07-02T07:54:03.080810Z INFO ExtHandler Fetch goal state completed Jul 2 07:54:03.104558 waagent[1608]: 2024-07-02T07:54:03.104444Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 07:54:03.116351 waagent[1608]: 2024-07-02T07:54:03.116251Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1608 Jul 2 07:54:03.119697 waagent[1608]: 2024-07-02T07:54:03.119629Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:54:03.121086 waagent[1608]: 2024-07-02T07:54:03.121027Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:54:03.125918 waagent[1608]: 2024-07-02T07:54:03.125864Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:54:03.126317 waagent[1608]: 2024-07-02T07:54:03.126262Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:54:03.134616 waagent[1608]: 2024-07-02T07:54:03.134561Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:54:03.135080 waagent[1608]: 2024-07-02T07:54:03.135024Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:54:03.141026 waagent[1608]: 2024-07-02T07:54:03.140933Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 07:54:03.142008 waagent[1608]: 2024-07-02T07:54:03.141946Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 07:54:03.143521 waagent[1608]: 2024-07-02T07:54:03.143461Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:54:03.143934 waagent[1608]: 2024-07-02T07:54:03.143878Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:03.144089 waagent[1608]: 2024-07-02T07:54:03.144040Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:03.144684 waagent[1608]: 2024-07-02T07:54:03.144626Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:54:03.144965 waagent[1608]: 2024-07-02T07:54:03.144911Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:54:03.144965 waagent[1608]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:54:03.144965 waagent[1608]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:54:03.144965 waagent[1608]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:54:03.144965 waagent[1608]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:03.144965 waagent[1608]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:03.144965 waagent[1608]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:54:03.147165 waagent[1608]: 2024-07-02T07:54:03.147051Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:54:03.148070 waagent[1608]: 2024-07-02T07:54:03.148007Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:54:03.148478 waagent[1608]: 2024-07-02T07:54:03.148420Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:54:03.149048 waagent[1608]: 2024-07-02T07:54:03.148993Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:54:03.151422 waagent[1608]: 2024-07-02T07:54:03.151356Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:54:03.152091 waagent[1608]: 2024-07-02T07:54:03.152030Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:54:03.152262 waagent[1608]: 2024-07-02T07:54:03.152211Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:54:03.152397 waagent[1608]: 2024-07-02T07:54:03.152352Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:54:03.155638 waagent[1608]: 2024-07-02T07:54:03.155551Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:54:03.155638 waagent[1608]: 2024-07-02T07:54:03.154890Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:54:03.161052 waagent[1608]: 2024-07-02T07:54:03.160976Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:54:03.173854 waagent[1608]: 2024-07-02T07:54:03.173740Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 07:54:03.173854 waagent[1608]: Executing ['ip', '-a', '-o', 'link']: Jul 2 07:54:03.173854 waagent[1608]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 07:54:03.173854 waagent[1608]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d9:7e:72 brd ff:ff:ff:ff:ff:ff Jul 2 07:54:03.173854 waagent[1608]: 3: enP61865s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d9:7e:72 brd ff:ff:ff:ff:ff:ff\ altname enP61865p0s2 Jul 2 07:54:03.173854 waagent[1608]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 07:54:03.173854 waagent[1608]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 07:54:03.173854 waagent[1608]: 2: eth0 inet 10.200.8.38/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 07:54:03.173854 waagent[1608]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 07:54:03.173854 waagent[1608]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 07:54:03.173854 waagent[1608]: 2: eth0 inet6 fe80::20d:3aff:fed9:7e72/64 scope link \ valid_lft forever preferred_lft forever Jul 2 07:54:03.178867 waagent[1608]: 2024-07-02T07:54:03.178782Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 07:54:03.211570 waagent[1608]: 2024-07-02T07:54:03.211497Z INFO ExtHandler ExtHandler Jul 2 07:54:03.211727 waagent[1608]: 2024-07-02T07:54:03.211672Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: a9b9ab35-eb71-4506-9dfd-e5e4759c9cf4 correlation 4eae0ed5-5063-42a5-b243-6daacfaf034f created: 2024-07-02T07:52:36.811714Z] Jul 2 07:54:03.212804 waagent[1608]: 2024-07-02T07:54:03.212741Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 07:54:03.214657 waagent[1608]: 2024-07-02T07:54:03.214599Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Jul 2 07:54:03.235640 waagent[1608]: 2024-07-02T07:54:03.235563Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 07:54:03.492427 waagent[1608]: 2024-07-02T07:54:03.492349Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: E8740397-C576-41A7-85C1-BA17C1E58D21;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 07:54:03.539979 waagent[1608]: 2024-07-02T07:54:03.539860Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 07:54:03.539979 waagent[1608]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:03.539979 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.539979 waagent[1608]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:03.539979 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.539979 waagent[1608]: Chain OUTPUT (policy ACCEPT 10 packets, 1100 bytes) Jul 2 07:54:03.539979 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.539979 waagent[1608]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:54:03.539979 waagent[1608]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:54:03.539979 waagent[1608]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:54:03.547067 waagent[1608]: 2024-07-02T07:54:03.546959Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 07:54:03.547067 waagent[1608]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:03.547067 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.547067 waagent[1608]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:54:03.547067 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.547067 waagent[1608]: Chain OUTPUT (policy ACCEPT 10 packets, 1100 bytes) Jul 2 07:54:03.547067 waagent[1608]: pkts bytes target prot opt in out source destination Jul 2 07:54:03.547067 waagent[1608]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:54:03.547067 waagent[1608]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:54:03.547067 waagent[1608]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:54:03.547650 waagent[1608]: 2024-07-02T07:54:03.547595Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 07:54:12.862476 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:54:12.862819 systemd[1]: Stopped kubelet.service. Jul 2 07:54:12.864968 systemd[1]: Starting kubelet.service... Jul 2 07:54:13.169774 systemd[1]: Started kubelet.service. Jul 2 07:54:13.474715 kubelet[1670]: E0702 07:54:13.474567 1670 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:13.476994 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:13.477152 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:23.612445 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 07:54:23.612788 systemd[1]: Stopped kubelet.service. Jul 2 07:54:23.614993 systemd[1]: Starting kubelet.service... Jul 2 07:54:23.695590 systemd[1]: Started kubelet.service. Jul 2 07:54:24.215866 kubelet[1681]: E0702 07:54:24.215808 1681 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:24.217870 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:24.218034 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:30.627781 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Jul 2 07:54:34.362454 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 07:54:34.362769 systemd[1]: Stopped kubelet.service. Jul 2 07:54:34.364957 systemd[1]: Starting kubelet.service... Jul 2 07:54:34.481453 systemd[1]: Started kubelet.service. Jul 2 07:54:34.951412 kubelet[1691]: E0702 07:54:34.951352 1691 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:34.953583 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:34.953749 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:36.218348 update_engine[1396]: I0702 07:54:36.218256 1396 update_attempter.cc:509] Updating boot flags... Jul 2 07:54:43.874910 systemd[1]: Created slice system-sshd.slice. Jul 2 07:54:43.876914 systemd[1]: Started sshd@0-10.200.8.38:22-10.200.16.10:37208.service. Jul 2 07:54:44.662002 sshd[1740]: Accepted publickey for core from 10.200.16.10 port 37208 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:44.663627 sshd[1740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:44.667482 systemd-logind[1395]: New session 3 of user core. Jul 2 07:54:44.668734 systemd[1]: Started session-3.scope. Jul 2 07:54:45.112339 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 07:54:45.112660 systemd[1]: Stopped kubelet.service. Jul 2 07:54:45.114901 systemd[1]: Starting kubelet.service... Jul 2 07:54:45.226513 systemd[1]: Started sshd@1-10.200.8.38:22-10.200.16.10:37220.service. Jul 2 07:54:45.231195 systemd[1]: Started kubelet.service. Jul 2 07:54:45.707160 kubelet[1750]: E0702 07:54:45.707053 1750 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:45.709209 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:45.709382 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:45.887252 sshd[1748]: Accepted publickey for core from 10.200.16.10 port 37220 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:45.889045 sshd[1748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:45.895158 systemd[1]: Started session-4.scope. Jul 2 07:54:45.895910 systemd-logind[1395]: New session 4 of user core. Jul 2 07:54:46.350196 sshd[1748]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:46.353786 systemd[1]: sshd@1-10.200.8.38:22-10.200.16.10:37220.service: Deactivated successfully. Jul 2 07:54:46.354933 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:54:46.355774 systemd-logind[1395]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:54:46.356688 systemd-logind[1395]: Removed session 4. Jul 2 07:54:46.458546 systemd[1]: Started sshd@2-10.200.8.38:22-10.200.16.10:37226.service. Jul 2 07:54:47.109376 sshd[1763]: Accepted publickey for core from 10.200.16.10 port 37226 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:47.111205 sshd[1763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:47.116226 systemd[1]: Started session-5.scope. Jul 2 07:54:47.116678 systemd-logind[1395]: New session 5 of user core. Jul 2 07:54:47.563816 sshd[1763]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:47.567429 systemd[1]: sshd@2-10.200.8.38:22-10.200.16.10:37226.service: Deactivated successfully. Jul 2 07:54:47.568520 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:54:47.569342 systemd-logind[1395]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:54:47.570341 systemd-logind[1395]: Removed session 5. Jul 2 07:54:47.673312 systemd[1]: Started sshd@3-10.200.8.38:22-10.200.16.10:37232.service. Jul 2 07:54:48.324151 sshd[1769]: Accepted publickey for core from 10.200.16.10 port 37232 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:48.325922 sshd[1769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:48.331011 systemd[1]: Started session-6.scope. Jul 2 07:54:48.331634 systemd-logind[1395]: New session 6 of user core. Jul 2 07:54:48.783569 sshd[1769]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:48.786981 systemd[1]: sshd@3-10.200.8.38:22-10.200.16.10:37232.service: Deactivated successfully. Jul 2 07:54:48.787929 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:54:48.788570 systemd-logind[1395]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:54:48.789351 systemd-logind[1395]: Removed session 6. Jul 2 07:54:48.894546 systemd[1]: Started sshd@4-10.200.8.38:22-10.200.16.10:34218.service. Jul 2 07:54:49.551198 sshd[1775]: Accepted publickey for core from 10.200.16.10 port 34218 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:49.552786 sshd[1775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:49.557696 systemd[1]: Started session-7.scope. Jul 2 07:54:49.558176 systemd-logind[1395]: New session 7 of user core. Jul 2 07:54:50.248680 sudo[1778]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:54:50.249071 sudo[1778]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:50.269333 dbus-daemon[1383]: ЍV0\x83U: received setenforce notice (enforcing=1787840064) Jul 2 07:54:50.271349 sudo[1778]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:50.392235 sshd[1775]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:50.396083 systemd[1]: sshd@4-10.200.8.38:22-10.200.16.10:34218.service: Deactivated successfully. Jul 2 07:54:50.397233 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:54:50.398015 systemd-logind[1395]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:54:50.399065 systemd-logind[1395]: Removed session 7. Jul 2 07:54:50.502124 systemd[1]: Started sshd@5-10.200.8.38:22-10.200.16.10:34228.service. Jul 2 07:54:51.160454 sshd[1782]: Accepted publickey for core from 10.200.16.10 port 34228 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:51.162356 sshd[1782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:51.167904 systemd[1]: Started session-8.scope. Jul 2 07:54:51.168533 systemd-logind[1395]: New session 8 of user core. Jul 2 07:54:51.519641 sudo[1786]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:54:51.520018 sudo[1786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:51.523409 sudo[1786]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:51.528346 sudo[1785]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:54:51.528632 sudo[1785]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:51.537943 systemd[1]: Stopping audit-rules.service... Jul 2 07:54:51.538000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:54:51.539858 auditctl[1789]: No rules Jul 2 07:54:51.544179 kernel: kauditd_printk_skb: 128 callbacks suppressed Jul 2 07:54:51.544253 kernel: audit: type=1305 audit(1719906891.538:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:54:51.540335 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:54:51.540499 systemd[1]: Stopped audit-rules.service. Jul 2 07:54:51.542131 systemd[1]: Starting audit-rules.service... Jul 2 07:54:51.564230 kernel: audit: type=1300 audit(1719906891.538:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff5270d160 a2=420 a3=0 items=0 ppid=1 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:51.538000 audit[1789]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff5270d160 a2=420 a3=0 items=0 ppid=1 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:51.538000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:54:51.569198 kernel: audit: type=1327 audit(1719906891.538:209): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:54:51.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.572169 augenrules[1806]: No rules Jul 2 07:54:51.572984 systemd[1]: Finished audit-rules.service. Jul 2 07:54:51.574141 sudo[1785]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:51.579839 kernel: audit: type=1131 audit(1719906891.538:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.579901 kernel: audit: type=1130 audit(1719906891.572:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.573000 audit[1785]: USER_END pid=1785 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.591117 kernel: audit: type=1106 audit(1719906891.573:212): pid=1785 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.573000 audit[1785]: CRED_DISP pid=1785 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.615695 kernel: audit: type=1104 audit(1719906891.573:213): pid=1785 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.680299 sshd[1782]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:51.680000 audit[1782]: USER_END pid=1782 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:51.684013 systemd[1]: sshd@5-10.200.8.38:22-10.200.16.10:34228.service: Deactivated successfully. Jul 2 07:54:51.684786 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:54:51.685949 systemd-logind[1395]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:54:51.686884 systemd-logind[1395]: Removed session 8. Jul 2 07:54:51.680000 audit[1782]: CRED_DISP pid=1782 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:51.711977 kernel: audit: type=1106 audit(1719906891.680:214): pid=1782 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:51.712046 kernel: audit: type=1104 audit(1719906891.680:215): pid=1782 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:51.712073 kernel: audit: type=1131 audit(1719906891.680:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.38:22-10.200.16.10:34228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.38:22-10.200.16.10:34228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:51.788418 systemd[1]: Started sshd@6-10.200.8.38:22-10.200.16.10:34238.service. Jul 2 07:54:51.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.16.10:34238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.442000 audit[1812]: USER_ACCT pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:52.443802 sshd[1812]: Accepted publickey for core from 10.200.16.10 port 34238 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:54:52.443000 audit[1812]: CRED_ACQ pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:52.444000 audit[1812]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff551596a0 a2=3 a3=0 items=0 ppid=1 pid=1812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:52.445581 sshd[1812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:52.451547 systemd[1]: Started session-9.scope. Jul 2 07:54:52.452171 systemd-logind[1395]: New session 9 of user core. Jul 2 07:54:52.455000 audit[1812]: USER_START pid=1812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:52.456000 audit[1814]: CRED_ACQ pid=1814 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:54:52.799000 audit[1815]: USER_ACCT pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.799000 audit[1815]: CRED_REFR pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.800279 sudo[1815]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:54:52.800616 sudo[1815]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:54:52.801000 audit[1815]: USER_START pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.824489 systemd[1]: Starting docker.service... Jul 2 07:54:52.875222 env[1825]: time="2024-07-02T07:54:52.875164140Z" level=info msg="Starting up" Jul 2 07:54:52.878670 env[1825]: time="2024-07-02T07:54:52.878640521Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:54:52.878821 env[1825]: time="2024-07-02T07:54:52.878808025Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:54:52.878883 env[1825]: time="2024-07-02T07:54:52.878871227Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:54:52.878929 env[1825]: time="2024-07-02T07:54:52.878920628Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:54:52.881169 env[1825]: time="2024-07-02T07:54:52.881141280Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:54:52.881169 env[1825]: time="2024-07-02T07:54:52.881159880Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:54:52.881324 env[1825]: time="2024-07-02T07:54:52.881179581Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:54:52.881324 env[1825]: time="2024-07-02T07:54:52.881190281Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:54:52.888691 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3447115177-merged.mount: Deactivated successfully. Jul 2 07:54:52.991092 env[1825]: time="2024-07-02T07:54:52.991037355Z" level=info msg="Loading containers: start." Jul 2 07:54:53.042000 audit[1853]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.042000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffda027ddc0 a2=0 a3=7ffda027ddac items=0 ppid=1825 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.042000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:54:53.044000 audit[1855]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.044000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc79ee53a0 a2=0 a3=7ffc79ee538c items=0 ppid=1825 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.044000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:54:53.045000 audit[1857]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.045000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc7e17b6d0 a2=0 a3=7ffc7e17b6bc items=0 ppid=1825 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:54:53.047000 audit[1859]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.047000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff65cac890 a2=0 a3=7fff65cac87c items=0 ppid=1825 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:54:53.049000 audit[1861]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.049000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1a094820 a2=0 a3=7fff1a09480c items=0 ppid=1825 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:54:53.052000 audit[1863]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.052000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3e8ee480 a2=0 a3=7fff3e8ee46c items=0 ppid=1825 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:54:53.069000 audit[1865]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.069000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4cddf5c0 a2=0 a3=7ffe4cddf5ac items=0 ppid=1825 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.069000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:54:53.071000 audit[1867]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.071000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc6edd02c0 a2=0 a3=7ffc6edd02ac items=0 ppid=1825 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:54:53.073000 audit[1869]: NETFILTER_CFG table=filter:16 family=2 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.073000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffe5302d90 a2=0 a3=7fffe5302d7c items=0 ppid=1825 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:53.093000 audit[1873]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_unregister_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.093000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd52887aa0 a2=0 a3=7ffd52887a8c items=0 ppid=1825 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:53.094000 audit[1874]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.094000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe001e4770 a2=0 a3=7ffe001e475c items=0 ppid=1825 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:53.137122 kernel: Initializing XFRM netlink socket Jul 2 07:54:53.171549 env[1825]: time="2024-07-02T07:54:53.171496773Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:54:53.263000 audit[1882]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.263000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe5f27eef0 a2=0 a3=7ffe5f27eedc items=0 ppid=1825 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:54:53.286000 audit[1885]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.286000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffee9da8540 a2=0 a3=7ffee9da852c items=0 ppid=1825 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:54:53.290000 audit[1888]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.290000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd31c47a50 a2=0 a3=7ffd31c47a3c items=0 ppid=1825 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.290000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:54:53.292000 audit[1890]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.292000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffec2d3ea10 a2=0 a3=7ffec2d3e9fc items=0 ppid=1825 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:54:53.294000 audit[1892]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.294000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd9aecbd70 a2=0 a3=7ffd9aecbd5c items=0 ppid=1825 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:54:53.296000 audit[1894]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.296000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc17970130 a2=0 a3=7ffc1797011c items=0 ppid=1825 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:54:53.298000 audit[1896]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.298000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffde9b335e0 a2=0 a3=7ffde9b335cc items=0 ppid=1825 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:54:53.300000 audit[1898]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.300000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffee7451010 a2=0 a3=7ffee7450ffc items=0 ppid=1825 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:54:53.303000 audit[1900]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.303000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc3946f0b0 a2=0 a3=7ffc3946f09c items=0 ppid=1825 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:54:53.305000 audit[1902]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.305000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcdcb0b610 a2=0 a3=7ffcdcb0b5fc items=0 ppid=1825 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:54:53.307000 audit[1904]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.307000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffedef9e960 a2=0 a3=7ffedef9e94c items=0 ppid=1825 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:54:53.308994 systemd-networkd[1561]: docker0: Link UP Jul 2 07:54:53.330000 audit[1908]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_unregister_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.330000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda0ea1910 a2=0 a3=7ffda0ea18fc items=0 ppid=1825 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:53.332000 audit[1909]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:53.332000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe21171fa0 a2=0 a3=7ffe21171f8c items=0 ppid=1825 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:53.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:54:53.333624 env[1825]: time="2024-07-02T07:54:53.333583067Z" level=info msg="Loading containers: done." Jul 2 07:54:53.345529 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3972071310-merged.mount: Deactivated successfully. Jul 2 07:54:53.548009 env[1825]: time="2024-07-02T07:54:53.547940851Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:54:53.548320 env[1825]: time="2024-07-02T07:54:53.548280559Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:54:53.548470 env[1825]: time="2024-07-02T07:54:53.548443063Z" level=info msg="Daemon has completed initialization" Jul 2 07:54:53.578272 systemd[1]: Started docker.service. Jul 2 07:54:53.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:53.588709 env[1825]: time="2024-07-02T07:54:53.588663179Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:54:55.862820 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 07:54:55.863131 systemd[1]: Stopped kubelet.service. Jul 2 07:54:55.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:55.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:55.865470 systemd[1]: Starting kubelet.service... Jul 2 07:54:57.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:57.450649 systemd[1]: Started kubelet.service. Jul 2 07:54:57.455861 kernel: kauditd_printk_skb: 86 callbacks suppressed Jul 2 07:54:57.455952 kernel: audit: type=1130 audit(1719906897.450:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:57.511050 kubelet[1951]: E0702 07:54:57.510689 1951 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:57.513039 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:57.513225 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:57.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:57.532121 kernel: audit: type=1131 audit(1719906897.512:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:59.380042 env[1407]: time="2024-07-02T07:54:59.379983771Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\"" Jul 2 07:55:00.083405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2574667454.mount: Deactivated successfully. Jul 2 07:55:02.772497 env[1407]: time="2024-07-02T07:55:02.772431346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:02.778306 env[1407]: time="2024-07-02T07:55:02.778260050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:02.783214 env[1407]: time="2024-07-02T07:55:02.783175238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:02.786609 env[1407]: time="2024-07-02T07:55:02.786571398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f4d993b3d73cc0d59558be584b5b40785b4a96874bc76873b69d1dd818485e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:02.787336 env[1407]: time="2024-07-02T07:55:02.787301911Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\" returns image reference \"sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f\"" Jul 2 07:55:02.797966 env[1407]: time="2024-07-02T07:55:02.797931201Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\"" Jul 2 07:55:05.253209 env[1407]: time="2024-07-02T07:55:05.253148849Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:05.260822 env[1407]: time="2024-07-02T07:55:05.260776275Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:05.265219 env[1407]: time="2024-07-02T07:55:05.265177547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:05.270148 env[1407]: time="2024-07-02T07:55:05.270110529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:692fc3f88a60b3afc76492ad347306d34042000f56f230959e9367fd59c48b1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:05.270802 env[1407]: time="2024-07-02T07:55:05.270764039Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\" returns image reference \"sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e\"" Jul 2 07:55:05.281117 env[1407]: time="2024-07-02T07:55:05.281073609Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\"" Jul 2 07:55:06.835332 env[1407]: time="2024-07-02T07:55:06.835263644Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:06.842752 env[1407]: time="2024-07-02T07:55:06.842704163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:06.847199 env[1407]: time="2024-07-02T07:55:06.847162535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:06.850336 env[1407]: time="2024-07-02T07:55:06.850307385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b91a4e45debd0d5336d9f533aefdf47d4b39b24071feb459e521709b9e4ec24f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:06.850944 env[1407]: time="2024-07-02T07:55:06.850913395Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\" returns image reference \"sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15\"" Jul 2 07:55:06.860978 env[1407]: time="2024-07-02T07:55:06.860953556Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 07:55:07.612391 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Jul 2 07:55:07.748406 kernel: audit: type=1130 audit(1719906907.611:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.748553 kernel: audit: type=1131 audit(1719906907.611:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.612664 systemd[1]: Stopped kubelet.service. Jul 2 07:55:07.614337 systemd[1]: Starting kubelet.service... Jul 2 07:55:07.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.908192 systemd[1]: Started kubelet.service. Jul 2 07:55:07.924166 kernel: audit: type=1130 audit(1719906907.907:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.960438 kubelet[1979]: E0702 07:55:07.960379 1979 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:07.962331 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:07.962497 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:07.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:07.977126 kernel: audit: type=1131 audit(1719906907.961:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:09.586536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1615248346.mount: Deactivated successfully. Jul 2 07:55:10.461800 env[1407]: time="2024-07-02T07:55:10.461737661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.466326 env[1407]: time="2024-07-02T07:55:10.466278727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.470112 env[1407]: time="2024-07-02T07:55:10.470064181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.474671 env[1407]: time="2024-07-02T07:55:10.474631748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:10.475171 env[1407]: time="2024-07-02T07:55:10.475138255Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9\"" Jul 2 07:55:10.485544 env[1407]: time="2024-07-02T07:55:10.485514305Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 07:55:11.062765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1549493626.mount: Deactivated successfully. Jul 2 07:55:12.261689 env[1407]: time="2024-07-02T07:55:12.261626044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.269507 env[1407]: time="2024-07-02T07:55:12.269464652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.274279 env[1407]: time="2024-07-02T07:55:12.274198317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.280088 env[1407]: time="2024-07-02T07:55:12.280033398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.280812 env[1407]: time="2024-07-02T07:55:12.280777808Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 07:55:12.291543 env[1407]: time="2024-07-02T07:55:12.291516755Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:55:12.784693 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1750913517.mount: Deactivated successfully. Jul 2 07:55:12.804188 env[1407]: time="2024-07-02T07:55:12.804143403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.809847 env[1407]: time="2024-07-02T07:55:12.809809681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.814496 env[1407]: time="2024-07-02T07:55:12.814467345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.817753 env[1407]: time="2024-07-02T07:55:12.817722090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:12.818159 env[1407]: time="2024-07-02T07:55:12.818129395Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:55:12.829028 env[1407]: time="2024-07-02T07:55:12.828995245Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 07:55:13.386899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3262877295.mount: Deactivated successfully. Jul 2 07:55:18.112174 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. Jul 2 07:55:18.127858 kernel: audit: type=1130 audit(1719906918.111:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.112474 systemd[1]: Stopped kubelet.service. Jul 2 07:55:18.114156 systemd[1]: Starting kubelet.service... Jul 2 07:55:18.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.143113 kernel: audit: type=1131 audit(1719906918.111:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.201709 systemd[1]: Started kubelet.service. Jul 2 07:55:18.216251 kernel: audit: type=1130 audit(1719906918.201:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.243303 env[1407]: time="2024-07-02T07:55:18.243233023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:18.728346 kubelet[2005]: E0702 07:55:18.728286 2005 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:18.730395 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:18.730557 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:18.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:18.746127 kernel: audit: type=1131 audit(1719906918.729:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:55:18.766562 env[1407]: time="2024-07-02T07:55:18.765208011Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:18.790128 env[1407]: time="2024-07-02T07:55:18.789638000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:18.798254 env[1407]: time="2024-07-02T07:55:18.798214002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:18.798937 env[1407]: time="2024-07-02T07:55:18.798900110Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Jul 2 07:55:21.819309 systemd[1]: Stopped kubelet.service. Jul 2 07:55:21.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:21.826419 systemd[1]: Starting kubelet.service... Jul 2 07:55:21.836923 kernel: audit: type=1130 audit(1719906921.818:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:21.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:21.856263 kernel: audit: type=1131 audit(1719906921.823:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:21.869921 systemd[1]: Reloading. Jul 2 07:55:21.976712 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-07-02T07:55:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:55:21.976750 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-07-02T07:55:21Z" level=info msg="torcx already run" Jul 2 07:55:22.073246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:22.073897 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:22.091464 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.200852 kernel: audit: type=1400 audit(1719906922.172:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.200937 kernel: audit: type=1400 audit(1719906922.172:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.200960 kernel: audit: type=1400 audit(1719906922.172:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.229174 kernel: audit: type=1400 audit(1719906922.172:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit: BPF prog-id=44 op=LOAD Jul 2 07:55:22.213000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit: BPF prog-id=45 op=LOAD Jul 2 07:55:22.228000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit: BPF prog-id=46 op=LOAD Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.228000 audit: BPF prog-id=47 op=LOAD Jul 2 07:55:22.228000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:55:22.228000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit: BPF prog-id=48 op=LOAD Jul 2 07:55:22.231000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit: BPF prog-id=49 op=LOAD Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.231000 audit: BPF prog-id=50 op=LOAD Jul 2 07:55:22.231000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:55:22.231000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.235000 audit: BPF prog-id=51 op=LOAD Jul 2 07:55:22.235000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit: BPF prog-id=52 op=LOAD Jul 2 07:55:22.236000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit: BPF prog-id=53 op=LOAD Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.236000 audit: BPF prog-id=54 op=LOAD Jul 2 07:55:22.236000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:55:22.236000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.238000 audit: BPF prog-id=55 op=LOAD Jul 2 07:55:22.238000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit: BPF prog-id=56 op=LOAD Jul 2 07:55:22.239000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit: BPF prog-id=57 op=LOAD Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:22.239000 audit: BPF prog-id=58 op=LOAD Jul 2 07:55:22.239000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:55:22.239000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:55:22.261291 systemd[1]: Started kubelet.service. Jul 2 07:55:22.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:22.264048 systemd[1]: Stopping kubelet.service... Jul 2 07:55:22.264646 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:55:22.264992 systemd[1]: Stopped kubelet.service. Jul 2 07:55:22.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:22.267007 systemd[1]: Starting kubelet.service... Jul 2 07:55:22.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:22.524447 systemd[1]: Started kubelet.service. Jul 2 07:55:22.575689 kubelet[2165]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:22.575689 kubelet[2165]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:55:22.575689 kubelet[2165]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:22.576200 kubelet[2165]: I0702 07:55:22.575747 2165 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:55:22.859365 kubelet[2165]: I0702 07:55:22.858735 2165 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 07:55:22.859365 kubelet[2165]: I0702 07:55:22.858770 2165 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:55:22.859365 kubelet[2165]: I0702 07:55:22.859114 2165 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 07:55:23.176088 kubelet[2165]: E0702 07:55:23.176051 2165 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.38:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.178173 kubelet[2165]: I0702 07:55:23.178141 2165 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:55:23.187047 kubelet[2165]: I0702 07:55:23.187023 2165 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:55:23.187315 kubelet[2165]: I0702 07:55:23.187297 2165 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:55:23.187504 kubelet[2165]: I0702 07:55:23.187484 2165 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:55:23.187657 kubelet[2165]: I0702 07:55:23.187514 2165 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:55:23.187657 kubelet[2165]: I0702 07:55:23.187527 2165 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:55:23.187745 kubelet[2165]: I0702 07:55:23.187657 2165 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:23.187784 kubelet[2165]: I0702 07:55:23.187778 2165 kubelet.go:396] "Attempting to sync node with API server" Jul 2 07:55:23.187840 kubelet[2165]: I0702 07:55:23.187824 2165 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:55:23.187937 kubelet[2165]: I0702 07:55:23.187867 2165 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:55:23.187937 kubelet[2165]: I0702 07:55:23.187888 2165 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:55:23.194721 kubelet[2165]: I0702 07:55:23.194703 2165 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:55:23.205490 kubelet[2165]: I0702 07:55:23.205469 2165 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:55:23.205669 kubelet[2165]: W0702 07:55:23.205655 2165 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:55:23.206381 kubelet[2165]: I0702 07:55:23.206360 2165 server.go:1256] "Started kubelet" Jul 2 07:55:23.206509 kubelet[2165]: W0702 07:55:23.206461 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.206570 kubelet[2165]: E0702 07:55:23.206535 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.206724 kubelet[2165]: W0702 07:55:23.206689 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-cc7572d280&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.206920 kubelet[2165]: E0702 07:55:23.206907 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-cc7572d280&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.207053 kubelet[2165]: I0702 07:55:23.207042 2165 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:55:23.207610 kubelet[2165]: I0702 07:55:23.207590 2165 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:55:23.214128 kernel: kauditd_printk_skb: 171 callbacks suppressed Jul 2 07:55:23.214201 kernel: audit: type=1400 audit(1719906923.206:440): avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:23.206000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:23.214298 kubelet[2165]: I0702 07:55:23.207991 2165 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:55:23.214298 kubelet[2165]: I0702 07:55:23.208024 2165 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:55:23.214298 kubelet[2165]: I0702 07:55:23.208085 2165 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:55:23.214556 kubelet[2165]: I0702 07:55:23.214542 2165 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:55:23.215186 kubelet[2165]: I0702 07:55:23.215173 2165 server.go:461] "Adding debug handlers to kubelet server" Jul 2 07:55:23.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:23.232263 kernel: audit: type=1401 audit(1719906923.206:440): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:23.206000 audit[2165]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae75c0 a1=c000bc8138 a2=c000ae7590 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.251189 kernel: audit: type=1300 audit(1719906923.206:440): arch=c000003e syscall=188 success=no exit=-22 a0=c000ae75c0 a1=c000bc8138 a2=c000ae7590 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.251253 kernel: audit: type=1327 audit(1719906923.206:440): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:23.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:23.206000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:23.269263 kubelet[2165]: I0702 07:55:23.269245 2165 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:55:23.280993 kernel: audit: type=1400 audit(1719906923.206:441): avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:23.281071 kernel: audit: type=1401 audit(1719906923.206:441): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:23.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:23.282619 kubelet[2165]: I0702 07:55:23.282598 2165 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:55:23.283072 kubelet[2165]: I0702 07:55:23.283058 2165 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:55:23.206000 audit[2165]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bba180 a1=c000bc8150 a2=c000ae7650 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.290993 kubelet[2165]: E0702 07:55:23.290973 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-cc7572d280?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="200ms" Jul 2 07:55:23.295259 kubelet[2165]: W0702 07:55:23.295212 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.295370 kubelet[2165]: E0702 07:55:23.295360 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.306356 kernel: audit: type=1300 audit(1719906923.206:441): arch=c000003e syscall=188 success=no exit=-22 a0=c000bba180 a1=c000bc8150 a2=c000ae7650 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:23.324193 kernel: audit: type=1327 audit(1719906923.206:441): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:23.324271 kernel: audit: type=1325 audit(1719906923.209:442): table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.209000 audit[2175]: NETFILTER_CFG table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.325808 kubelet[2165]: E0702 07:55:23.325783 2165 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.38:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.38:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-cc7572d280.17de563bf472d21f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-cc7572d280,UID:ci-3510.3.5-a-cc7572d280,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-cc7572d280,},FirstTimestamp:2024-07-02 07:55:23.206332959 +0000 UTC m=+0.676005736,LastTimestamp:2024-07-02 07:55:23.206332959 +0000 UTC m=+0.676005736,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-cc7572d280,}" Jul 2 07:55:23.209000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2ac9b910 a2=0 a3=7ffd2ac9b8fc items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.343684 kubelet[2165]: I0702 07:55:23.334698 2165 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:55:23.343684 kubelet[2165]: E0702 07:55:23.336350 2165 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:55:23.343684 kubelet[2165]: I0702 07:55:23.338069 2165 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:55:23.343684 kubelet[2165]: I0702 07:55:23.338079 2165 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:55:23.352124 kernel: audit: type=1300 audit(1719906923.209:442): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2ac9b910 a2=0 a3=7ffd2ac9b8fc items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:23.211000 audit[2176]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.211000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff28d6a0f0 a2=0 a3=7fff28d6a0dc items=0 ppid=2165 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:23.285000 audit[2178]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.285000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2f72cc30 a2=0 a3=7fff2f72cc1c items=0 ppid=2165 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:23.295000 audit[2180]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.295000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd1f9c550 a2=0 a3=7fffd1f9c53c items=0 ppid=2165 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:23.358000 audit[2184]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.358000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff2ee46100 a2=0 a3=7fff2ee460ec items=0 ppid=2165 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:55:23.360377 kubelet[2165]: I0702 07:55:23.360348 2165 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:55:23.363000 audit[2187]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:23.363000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed0a568a0 a2=0 a3=7ffed0a5688c items=0 ppid=2165 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:23.364982 kubelet[2165]: I0702 07:55:23.364957 2165 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:55:23.365053 kubelet[2165]: I0702 07:55:23.364995 2165 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:55:23.365053 kubelet[2165]: I0702 07:55:23.365020 2165 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 07:55:23.365154 kubelet[2165]: E0702 07:55:23.365078 2165 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:55:23.364000 audit[2188]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.364000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc527dbaf0 a2=0 a3=7ffc527dbadc items=0 ppid=2165 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:23.366193 kubelet[2165]: W0702 07:55:23.366154 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.366271 kubelet[2165]: E0702 07:55:23.366199 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:23.366000 audit[2191]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:23.366000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5cd844e0 a2=0 a3=7ffe5cd844cc items=0 ppid=2165 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:23.366000 audit[2192]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.366000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c112ee0 a2=0 a3=7ffd7c112ecc items=0 ppid=2165 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:23.367000 audit[2194]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:23.367000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9f5f7e90 a2=0 a3=7ffd9f5f7e7c items=0 ppid=2165 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:23.368000 audit[2195]: NETFILTER_CFG table=nat:42 family=10 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:23.368000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa77bf850 a2=0 a3=7fffa77bf83c items=0 ppid=2165 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:23.369000 audit[2196]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:23.369000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8d6118c0 a2=0 a3=7ffd8d6118ac items=0 ppid=2165 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:23.436001 kubelet[2165]: I0702 07:55:23.435873 2165 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.439691 kubelet[2165]: E0702 07:55:23.439642 2165 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.439848 kubelet[2165]: I0702 07:55:23.439739 2165 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:55:23.439848 kubelet[2165]: I0702 07:55:23.439755 2165 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:55:23.439848 kubelet[2165]: I0702 07:55:23.439776 2165 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:23.445117 kubelet[2165]: I0702 07:55:23.445074 2165 policy_none.go:49] "None policy: Start" Jul 2 07:55:23.445796 kubelet[2165]: I0702 07:55:23.445769 2165 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:55:23.445796 kubelet[2165]: I0702 07:55:23.445795 2165 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:55:23.455468 systemd[1]: Created slice kubepods.slice. Jul 2 07:55:23.460231 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:55:23.463020 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:55:23.465163 kubelet[2165]: E0702 07:55:23.465139 2165 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 07:55:23.471742 kubelet[2165]: I0702 07:55:23.471717 2165 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:55:23.470000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:23.470000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:23.470000 audit[2165]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfa3f0 a1=c000e8c978 a2=c000dfa3c0 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.470000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:23.472070 kubelet[2165]: I0702 07:55:23.471803 2165 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:55:23.472070 kubelet[2165]: I0702 07:55:23.472016 2165 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:55:23.474493 kubelet[2165]: E0702 07:55:23.474333 2165 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-cc7572d280\" not found" Jul 2 07:55:23.492195 kubelet[2165]: E0702 07:55:23.492174 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-cc7572d280?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="400ms" Jul 2 07:55:23.641690 kubelet[2165]: I0702 07:55:23.641659 2165 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.642302 kubelet[2165]: E0702 07:55:23.642218 2165 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.665496 kubelet[2165]: I0702 07:55:23.665460 2165 topology_manager.go:215] "Topology Admit Handler" podUID="8209a3d4786f89b63e71d2a90e139c74" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.667333 kubelet[2165]: I0702 07:55:23.667306 2165 topology_manager.go:215] "Topology Admit Handler" podUID="d8dc1adcf9bf86c458c3569b23f7a308" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.669301 kubelet[2165]: I0702 07:55:23.669170 2165 topology_manager.go:215] "Topology Admit Handler" podUID="4eaf02db9fe51eb4470ba75ead7ac672" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.675620 systemd[1]: Created slice kubepods-burstable-pod8209a3d4786f89b63e71d2a90e139c74.slice. Jul 2 07:55:23.684659 systemd[1]: Created slice kubepods-burstable-podd8dc1adcf9bf86c458c3569b23f7a308.slice. Jul 2 07:55:23.685704 kubelet[2165]: I0702 07:55:23.685676 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.689032 systemd[1]: Created slice kubepods-burstable-pod4eaf02db9fe51eb4470ba75ead7ac672.slice. Jul 2 07:55:23.786413 kubelet[2165]: I0702 07:55:23.786363 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786667 kubelet[2165]: I0702 07:55:23.786449 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786667 kubelet[2165]: I0702 07:55:23.786489 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786667 kubelet[2165]: I0702 07:55:23.786529 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786667 kubelet[2165]: I0702 07:55:23.786586 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786667 kubelet[2165]: I0702 07:55:23.786655 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786951 kubelet[2165]: I0702 07:55:23.786741 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.786951 kubelet[2165]: I0702 07:55:23.786788 2165 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4eaf02db9fe51eb4470ba75ead7ac672-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-cc7572d280\" (UID: \"4eaf02db9fe51eb4470ba75ead7ac672\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:23.893538 kubelet[2165]: E0702 07:55:23.893501 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-cc7572d280?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="800ms" Jul 2 07:55:23.986348 env[1407]: time="2024-07-02T07:55:23.985888368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-cc7572d280,Uid:8209a3d4786f89b63e71d2a90e139c74,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:23.991897 env[1407]: time="2024-07-02T07:55:23.991857331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-cc7572d280,Uid:d8dc1adcf9bf86c458c3569b23f7a308,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:23.992806 env[1407]: time="2024-07-02T07:55:23.992765941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-cc7572d280,Uid:4eaf02db9fe51eb4470ba75ead7ac672,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:24.044577 kubelet[2165]: I0702 07:55:24.044543 2165 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:24.044953 kubelet[2165]: E0702 07:55:24.044913 2165 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:24.173208 kubelet[2165]: W0702 07:55:24.173139 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.173208 kubelet[2165]: E0702 07:55:24.173210 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.234907 kubelet[2165]: W0702 07:55:24.234865 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.234907 kubelet[2165]: E0702 07:55:24.234913 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.353915 kubelet[2165]: W0702 07:55:24.353783 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-cc7572d280&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.353915 kubelet[2165]: E0702 07:55:24.353859 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-cc7572d280&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.467263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3712243341.mount: Deactivated successfully. Jul 2 07:55:24.507651 env[1407]: time="2024-07-02T07:55:24.507582540Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.510428 env[1407]: time="2024-07-02T07:55:24.510383869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.519698 env[1407]: time="2024-07-02T07:55:24.519663064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.522702 env[1407]: time="2024-07-02T07:55:24.522670795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.526514 env[1407]: time="2024-07-02T07:55:24.526479635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.532761 env[1407]: time="2024-07-02T07:55:24.532729999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.538185 env[1407]: time="2024-07-02T07:55:24.538154755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.543562 env[1407]: time="2024-07-02T07:55:24.543527410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.548306 env[1407]: time="2024-07-02T07:55:24.548274059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.554516 env[1407]: time="2024-07-02T07:55:24.554480723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.559421 env[1407]: time="2024-07-02T07:55:24.559385373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.564138 env[1407]: time="2024-07-02T07:55:24.564091522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:24.642933 kubelet[2165]: W0702 07:55:24.642891 2165 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.642933 kubelet[2165]: E0702 07:55:24.642937 2165 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Jul 2 07:55:24.668280 env[1407]: time="2024-07-02T07:55:24.668212793Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:24.668442 env[1407]: time="2024-07-02T07:55:24.668292094Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:24.668442 env[1407]: time="2024-07-02T07:55:24.668320894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:24.668562 env[1407]: time="2024-07-02T07:55:24.668455296Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30ff864767e8e3432426b291ad19691f96f71106fae552441fb20f009911aaf6 pid=2204 runtime=io.containerd.runc.v2 Jul 2 07:55:24.675604 env[1407]: time="2024-07-02T07:55:24.670923121Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:24.675604 env[1407]: time="2024-07-02T07:55:24.670987722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:24.675604 env[1407]: time="2024-07-02T07:55:24.671017222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:24.675604 env[1407]: time="2024-07-02T07:55:24.671197624Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c pid=2216 runtime=io.containerd.runc.v2 Jul 2 07:55:24.692653 systemd[1]: Started cri-containerd-30ff864767e8e3432426b291ad19691f96f71106fae552441fb20f009911aaf6.scope. Jul 2 07:55:24.695846 systemd[1]: Started cri-containerd-9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c.scope. Jul 2 07:55:24.699299 kubelet[2165]: E0702 07:55:24.699267 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-cc7572d280?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="1.6s" Jul 2 07:55:24.708559 env[1407]: time="2024-07-02T07:55:24.708477607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:24.708669 env[1407]: time="2024-07-02T07:55:24.708602009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:24.708669 env[1407]: time="2024-07-02T07:55:24.708641109Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:24.708842 env[1407]: time="2024-07-02T07:55:24.708804311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f pid=2254 runtime=io.containerd.runc.v2 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.720000 audit: BPF prog-id=59 op=LOAD Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2204 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666638363437363765386533343332343236623239316164313936 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2204 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666638363437363765386533343332343236623239316164313936 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.722000 audit: BPF prog-id=60 op=LOAD Jul 2 07:55:24.722000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e4340 items=0 ppid=2204 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666638363437363765386533343332343236623239316164313936 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.723000 audit: BPF prog-id=61 op=LOAD Jul 2 07:55:24.723000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e4388 items=0 ppid=2204 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666638363437363765386533343332343236623239316164313936 Jul 2 07:55:24.724000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:55:24.724000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.724000 audit: BPF prog-id=62 op=LOAD Jul 2 07:55:24.724000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4798 items=0 ppid=2204 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666638363437363765386533343332343236623239316164313936 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.733000 audit: BPF prog-id=63 op=LOAD Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2216 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326239663663363266653233643464613032353231333938386265 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2216 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326239663663363266653233643464613032353231333938386265 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit: BPF prog-id=64 op=LOAD Jul 2 07:55:24.734000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003228c0 items=0 ppid=2216 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326239663663363266653233643464613032353231333938386265 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit: BPF prog-id=65 op=LOAD Jul 2 07:55:24.734000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000322908 items=0 ppid=2216 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326239663663363266653233643464613032353231333938386265 Jul 2 07:55:24.734000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:55:24.734000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.734000 audit: BPF prog-id=66 op=LOAD Jul 2 07:55:24.734000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000322d18 items=0 ppid=2216 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326239663663363266653233643464613032353231333938386265 Jul 2 07:55:24.740385 systemd[1]: Started cri-containerd-28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f.scope. Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit: BPF prog-id=67 op=LOAD Jul 2 07:55:24.779000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.779000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363736323133313738363336313532383037633734373236303762 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363736323133313738363336313532383037633734373236303762 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit: BPF prog-id=68 op=LOAD Jul 2 07:55:24.780000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000289520 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363736323133313738363336313532383037633734373236303762 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit: BPF prog-id=69 op=LOAD Jul 2 07:55:24.780000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000289568 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363736323133313738363336313532383037633734373236303762 Jul 2 07:55:24.780000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:55:24.780000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.780000 audit: BPF prog-id=70 op=LOAD Jul 2 07:55:24.780000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000289978 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363736323133313738363336313532383037633734373236303762 Jul 2 07:55:24.793426 env[1407]: time="2024-07-02T07:55:24.793377981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-cc7572d280,Uid:8209a3d4786f89b63e71d2a90e139c74,Namespace:kube-system,Attempt:0,} returns sandbox id \"30ff864767e8e3432426b291ad19691f96f71106fae552441fb20f009911aaf6\"" Jul 2 07:55:24.795162 env[1407]: time="2024-07-02T07:55:24.795061798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-cc7572d280,Uid:d8dc1adcf9bf86c458c3569b23f7a308,Namespace:kube-system,Attempt:0,} returns sandbox id \"9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c\"" Jul 2 07:55:24.802444 env[1407]: time="2024-07-02T07:55:24.802403674Z" level=info msg="CreateContainer within sandbox \"30ff864767e8e3432426b291ad19691f96f71106fae552441fb20f009911aaf6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:55:24.804287 env[1407]: time="2024-07-02T07:55:24.804254993Z" level=info msg="CreateContainer within sandbox \"9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:55:24.828204 env[1407]: time="2024-07-02T07:55:24.828159939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-cc7572d280,Uid:4eaf02db9fe51eb4470ba75ead7ac672,Namespace:kube-system,Attempt:0,} returns sandbox id \"28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f\"" Jul 2 07:55:24.830720 env[1407]: time="2024-07-02T07:55:24.830680765Z" level=info msg="CreateContainer within sandbox \"28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:55:24.846725 kubelet[2165]: I0702 07:55:24.846687 2165 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:24.847217 kubelet[2165]: E0702 07:55:24.847189 2165 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:24.876033 env[1407]: time="2024-07-02T07:55:24.875969531Z" level=info msg="CreateContainer within sandbox \"30ff864767e8e3432426b291ad19691f96f71106fae552441fb20f009911aaf6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"acc609bce2b335d846ca40152c4c163d676bcc1217aa5f53e7007d0cc34505e4\"" Jul 2 07:55:24.876800 env[1407]: time="2024-07-02T07:55:24.876759739Z" level=info msg="StartContainer for \"acc609bce2b335d846ca40152c4c163d676bcc1217aa5f53e7007d0cc34505e4\"" Jul 2 07:55:24.899450 env[1407]: time="2024-07-02T07:55:24.893058007Z" level=info msg="CreateContainer within sandbox \"9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf\"" Jul 2 07:55:24.899899 env[1407]: time="2024-07-02T07:55:24.899846877Z" level=info msg="StartContainer for \"84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf\"" Jul 2 07:55:24.904946 systemd[1]: Started cri-containerd-acc609bce2b335d846ca40152c4c163d676bcc1217aa5f53e7007d0cc34505e4.scope. Jul 2 07:55:24.907479 env[1407]: time="2024-07-02T07:55:24.907438855Z" level=info msg="CreateContainer within sandbox \"28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a\"" Jul 2 07:55:24.910313 env[1407]: time="2024-07-02T07:55:24.910283184Z" level=info msg="StartContainer for \"c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a\"" Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.936000 audit: BPF prog-id=71 op=LOAD Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2204 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633630396263653262333335643834366361343031353263346331 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2204 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633630396263653262333335643834366361343031353263346331 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit: BPF prog-id=72 op=LOAD Jul 2 07:55:24.937000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002de420 items=0 ppid=2204 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633630396263653262333335643834366361343031353263346331 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit: BPF prog-id=73 op=LOAD Jul 2 07:55:24.937000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002de468 items=0 ppid=2204 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633630396263653262333335643834366361343031353263346331 Jul 2 07:55:24.937000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:55:24.937000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.937000 audit: BPF prog-id=74 op=LOAD Jul 2 07:55:24.937000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002de878 items=0 ppid=2204 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633630396263653262333335643834366361343031353263346331 Jul 2 07:55:24.949994 systemd[1]: Started cri-containerd-c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a.scope. Jul 2 07:55:24.957408 systemd[1]: Started cri-containerd-84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf.scope. Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.978000 audit: BPF prog-id=75 op=LOAD Jul 2 07:55:24.979000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.979000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2254 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323662646338373231666636613438323037346362306538626236 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2254 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323662646338373231666636613438323037346362306538626236 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.980000 audit: BPF prog-id=76 op=LOAD Jul 2 07:55:24.980000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d7d00 items=0 ppid=2254 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323662646338373231666636613438323037346362306538626236 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.981000 audit: BPF prog-id=77 op=LOAD Jul 2 07:55:24.981000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d7d48 items=0 ppid=2254 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323662646338373231666636613438323037346362306538626236 Jul 2 07:55:24.982000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:55:24.982000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.982000 audit: BPF prog-id=78 op=LOAD Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.990000 audit: BPF prog-id=79 op=LOAD Jul 2 07:55:24.992000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.992000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834656463336635383733376636363835663661646235643030356530 Jul 2 07:55:24.992000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.992000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834656463336635383733376636363835663661646235643030356530 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.993000 audit: BPF prog-id=80 op=LOAD Jul 2 07:55:24.993000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003de0e0 items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834656463336635383733376636363835663661646235643030356530 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.994000 audit: BPF prog-id=81 op=LOAD Jul 2 07:55:24.994000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003de128 items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834656463336635383733376636363835663661646235643030356530 Jul 2 07:55:24.995000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:55:24.995000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:24.995000 audit: BPF prog-id=82 op=LOAD Jul 2 07:55:24.982000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc158 items=0 ppid=2254 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323662646338373231666636613438323037346362306538626236 Jul 2 07:55:24.995000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003de538 items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834656463336635383733376636363835663661646235643030356530 Jul 2 07:55:25.034700 env[1407]: time="2024-07-02T07:55:25.034654656Z" level=info msg="StartContainer for \"acc609bce2b335d846ca40152c4c163d676bcc1217aa5f53e7007d0cc34505e4\" returns successfully" Jul 2 07:55:25.065128 env[1407]: time="2024-07-02T07:55:25.065037061Z" level=info msg="StartContainer for \"c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a\" returns successfully" Jul 2 07:55:25.075264 env[1407]: time="2024-07-02T07:55:25.075208664Z" level=info msg="StartContainer for \"84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf\" returns successfully" Jul 2 07:55:26.449971 kubelet[2165]: I0702 07:55:26.449933 2165 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:26.493000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:26.493000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000638000 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:26.493000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:26.495000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:26.495000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000cfc20 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:26.495000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:27.240000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.240000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00618e8a0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.240000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.240000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00618e900 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.243000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.243000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c005fe8960 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.246000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.246000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c005b13300 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.249000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.249000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0040124e0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.250000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:27.250000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00631b4d0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:55:27.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:27.373947 kubelet[2165]: E0702 07:55:27.373901 2165 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-cc7572d280\" not found" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:27.431772 kubelet[2165]: I0702 07:55:27.431730 2165 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:28.006717 kubelet[2165]: E0702 07:55:28.006679 2165 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:28.209221 kubelet[2165]: I0702 07:55:28.209165 2165 apiserver.go:52] "Watching apiserver" Jul 2 07:55:28.283178 kubelet[2165]: I0702 07:55:28.283041 2165 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:55:30.251528 kubelet[2165]: W0702 07:55:30.251491 2165 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:55:30.263084 systemd[1]: Reloading. Jul 2 07:55:30.335000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:55:30.341756 kernel: kauditd_printk_skb: 404 callbacks suppressed Jul 2 07:55:30.341871 kernel: audit: type=1400 audit(1719906930.335:571): avc: denied { watch } for pid=2385 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:55:30.335000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a5f100 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:30.393128 kernel: audit: type=1300 audit(1719906930.335:571): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a5f100 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:30.335000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:30.408007 /usr/lib/systemd/system-generators/torcx-generator[2454]: time="2024-07-02T07:55:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:55:30.408033 /usr/lib/systemd/system-generators/torcx-generator[2454]: time="2024-07-02T07:55:30Z" level=info msg="torcx already run" Jul 2 07:55:30.416867 kernel: audit: type=1327 audit(1719906930.335:571): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:30.526920 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:30.526940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:30.545935 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.646127 kernel: audit: type=1400 audit(1719906930.629:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.665128 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:55:30.665234 kernel: audit: type=1400 audit(1719906930.629:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.665261 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.685209 kernel: audit: type=1400 audit(1719906930.629:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.685321 kernel: audit: backlog limit exceeded Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.702621 kernel: audit: type=1400 audit(1719906930.629:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.629000 audit: BPF prog-id=83 op=LOAD Jul 2 07:55:30.629000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.630000 audit: BPF prog-id=84 op=LOAD Jul 2 07:55:30.630000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.644000 audit: BPF prog-id=85 op=LOAD Jul 2 07:55:30.644000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit: BPF prog-id=86 op=LOAD Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit: BPF prog-id=87 op=LOAD Jul 2 07:55:30.645000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:55:30.645000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.688000 audit: BPF prog-id=88 op=LOAD Jul 2 07:55:30.688000 audit: BPF prog-id=71 op=UNLOAD Jul 2 07:55:30.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.708000 audit: BPF prog-id=92 op=LOAD Jul 2 07:55:30.708000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.710000 audit: BPF prog-id=93 op=LOAD Jul 2 07:55:30.710000 audit: BPF prog-id=67 op=UNLOAD Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.711000 audit: BPF prog-id=94 op=LOAD Jul 2 07:55:30.711000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.712000 audit: BPF prog-id=95 op=LOAD Jul 2 07:55:30.712000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit: BPF prog-id=96 op=LOAD Jul 2 07:55:30.713000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit: BPF prog-id=97 op=LOAD Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.714000 audit: BPF prog-id=98 op=LOAD Jul 2 07:55:30.714000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:55:30.714000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.715000 audit: BPF prog-id=99 op=LOAD Jul 2 07:55:30.715000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.716000 audit: BPF prog-id=100 op=LOAD Jul 2 07:55:30.716000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit: BPF prog-id=101 op=LOAD Jul 2 07:55:30.719000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit: BPF prog-id=102 op=LOAD Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.719000 audit: BPF prog-id=103 op=LOAD Jul 2 07:55:30.719000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:55:30.719000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:55:30.737775 kubelet[2165]: I0702 07:55:30.737621 2165 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:55:30.740347 systemd[1]: Stopping kubelet.service... Jul 2 07:55:30.759371 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:55:30.759596 systemd[1]: Stopped kubelet.service. Jul 2 07:55:30.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.761775 systemd[1]: Starting kubelet.service... Jul 2 07:55:30.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.894877 systemd[1]: Started kubelet.service. Jul 2 07:55:30.972461 kubelet[2521]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:30.972461 kubelet[2521]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:55:30.972461 kubelet[2521]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:30.972933 kubelet[2521]: I0702 07:55:30.972530 2521 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:55:30.977461 kubelet[2521]: I0702 07:55:30.977426 2521 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 07:55:30.977461 kubelet[2521]: I0702 07:55:30.977452 2521 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:55:30.977757 kubelet[2521]: I0702 07:55:30.977643 2521 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 07:55:30.979041 kubelet[2521]: I0702 07:55:30.979013 2521 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:55:30.980698 kubelet[2521]: I0702 07:55:30.980679 2521 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990222 2521 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990533 2521 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990720 2521 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990758 2521 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990771 2521 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:55:30.991115 kubelet[2521]: I0702 07:55:30.990802 2521 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:30.991523 kubelet[2521]: I0702 07:55:30.990939 2521 kubelet.go:396] "Attempting to sync node with API server" Jul 2 07:55:30.995337 kubelet[2521]: I0702 07:55:30.992161 2521 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:55:30.995337 kubelet[2521]: I0702 07:55:30.992213 2521 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:55:30.995337 kubelet[2521]: I0702 07:55:30.992237 2521 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:55:30.998643 kubelet[2521]: I0702 07:55:30.998622 2521 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:55:30.998858 kubelet[2521]: I0702 07:55:30.998842 2521 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:55:30.999000 audit[2521]: AVC avc: denied { mac_admin } for pid=2521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.999000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:30.999000 audit[2521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00096a810 a1=c000701fe0 a2=c00096a7e0 a3=25 items=0 ppid=1 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.999000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:30.999000 audit[2521]: AVC avc: denied { mac_admin } for pid=2521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:30.999000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:30.999000 audit[2521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000711f20 a1=c0009e6000 a2=c00096a8a0 a3=25 items=0 ppid=1 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.999000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:31.001653 kubelet[2521]: I0702 07:55:30.999311 2521 server.go:1256] "Started kubelet" Jul 2 07:55:31.001653 kubelet[2521]: I0702 07:55:31.001069 2521 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:55:31.001653 kubelet[2521]: I0702 07:55:31.001144 2521 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:55:31.001653 kubelet[2521]: I0702 07:55:31.001178 2521 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:55:31.008501 kubelet[2521]: I0702 07:55:31.007589 2521 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:55:31.008625 kubelet[2521]: I0702 07:55:31.008591 2521 server.go:461] "Adding debug handlers to kubelet server" Jul 2 07:55:31.009868 kubelet[2521]: I0702 07:55:31.009847 2521 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:55:31.010045 kubelet[2521]: I0702 07:55:31.010031 2521 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:55:31.010631 kubelet[2521]: I0702 07:55:31.010609 2521 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:55:31.014473 kubelet[2521]: I0702 07:55:31.014456 2521 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:55:31.014767 kubelet[2521]: I0702 07:55:31.014753 2521 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:55:31.017171 kubelet[2521]: I0702 07:55:31.017153 2521 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:55:31.021143 kubelet[2521]: I0702 07:55:31.019389 2521 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:55:31.021143 kubelet[2521]: I0702 07:55:31.019414 2521 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:55:31.021143 kubelet[2521]: I0702 07:55:31.019430 2521 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 07:55:31.021143 kubelet[2521]: E0702 07:55:31.019477 2521 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:55:31.026539 kubelet[2521]: E0702 07:55:31.026519 2521 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:55:31.031057 kubelet[2521]: I0702 07:55:31.031032 2521 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:55:31.031057 kubelet[2521]: I0702 07:55:31.031056 2521 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:55:31.031218 kubelet[2521]: I0702 07:55:31.031144 2521 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:55:31.093911 kubelet[2521]: I0702 07:55:31.093882 2521 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:55:31.094160 kubelet[2521]: I0702 07:55:31.094145 2521 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:55:31.094282 kubelet[2521]: I0702 07:55:31.094275 2521 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:31.094472 kubelet[2521]: I0702 07:55:31.094463 2521 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:55:31.094536 kubelet[2521]: I0702 07:55:31.094530 2521 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:55:31.094581 kubelet[2521]: I0702 07:55:31.094576 2521 policy_none.go:49] "None policy: Start" Jul 2 07:55:31.095247 kubelet[2521]: I0702 07:55:31.095232 2521 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:55:31.095348 kubelet[2521]: I0702 07:55:31.095342 2521 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:55:31.095576 kubelet[2521]: I0702 07:55:31.095567 2521 state_mem.go:75] "Updated machine memory state" Jul 2 07:55:31.099419 kubelet[2521]: I0702 07:55:31.099405 2521 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:55:31.098000 audit[2521]: AVC avc: denied { mac_admin } for pid=2521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:31.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:31.098000 audit[2521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00052f230 a1=c000dc1ea8 a2=c00052f200 a3=25 items=0 ppid=1 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:31.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:31.100340 kubelet[2521]: I0702 07:55:31.099854 2521 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:55:31.101093 kubelet[2521]: I0702 07:55:31.100561 2521 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:55:31.113971 kubelet[2521]: I0702 07:55:31.113944 2521 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.119976 kubelet[2521]: I0702 07:55:31.119947 2521 topology_manager.go:215] "Topology Admit Handler" podUID="8209a3d4786f89b63e71d2a90e139c74" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.120145 kubelet[2521]: I0702 07:55:31.120131 2521 topology_manager.go:215] "Topology Admit Handler" podUID="d8dc1adcf9bf86c458c3569b23f7a308" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.120217 kubelet[2521]: I0702 07:55:31.120195 2521 topology_manager.go:215] "Topology Admit Handler" podUID="4eaf02db9fe51eb4470ba75ead7ac672" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.130751 kubelet[2521]: W0702 07:55:31.130510 2521 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:55:31.130891 kubelet[2521]: W0702 07:55:31.130828 2521 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:55:31.132799 kubelet[2521]: W0702 07:55:31.132776 2521 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:55:31.132895 kubelet[2521]: E0702 07:55:31.132854 2521 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.138203 kubelet[2521]: I0702 07:55:31.138178 2521 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.138316 kubelet[2521]: I0702 07:55:31.138260 2521 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.216756 kubelet[2521]: I0702 07:55:31.216616 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217058 kubelet[2521]: I0702 07:55:31.217037 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217237 kubelet[2521]: I0702 07:55:31.217222 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217379 kubelet[2521]: I0702 07:55:31.217364 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217504 kubelet[2521]: I0702 07:55:31.217489 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8209a3d4786f89b63e71d2a90e139c74-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" (UID: \"8209a3d4786f89b63e71d2a90e139c74\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217629 kubelet[2521]: I0702 07:55:31.217617 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4eaf02db9fe51eb4470ba75ead7ac672-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-cc7572d280\" (UID: \"4eaf02db9fe51eb4470ba75ead7ac672\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217752 kubelet[2521]: I0702 07:55:31.217740 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.217881 kubelet[2521]: I0702 07:55:31.217868 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.218008 kubelet[2521]: I0702 07:55:31.217994 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d8dc1adcf9bf86c458c3569b23f7a308-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-cc7572d280\" (UID: \"d8dc1adcf9bf86c458c3569b23f7a308\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:31.997428 kubelet[2521]: I0702 07:55:31.997380 2521 apiserver.go:52] "Watching apiserver" Jul 2 07:55:32.015372 kubelet[2521]: I0702 07:55:32.015338 2521 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:55:32.074878 kubelet[2521]: W0702 07:55:32.074424 2521 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 07:55:32.074878 kubelet[2521]: E0702 07:55:32.074518 2521 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-cc7572d280\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" Jul 2 07:55:32.108543 kubelet[2521]: I0702 07:55:32.108493 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-cc7572d280" podStartSLOduration=1.10844274 podStartE2EDuration="1.10844274s" podCreationTimestamp="2024-07-02 07:55:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:32.096050433 +0000 UTC m=+1.191929395" watchObservedRunningTime="2024-07-02 07:55:32.10844274 +0000 UTC m=+1.204321602" Jul 2 07:55:32.118171 kubelet[2521]: I0702 07:55:32.118133 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-cc7572d280" podStartSLOduration=2.117984322 podStartE2EDuration="2.117984322s" podCreationTimestamp="2024-07-02 07:55:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:32.108775843 +0000 UTC m=+1.204654705" watchObservedRunningTime="2024-07-02 07:55:32.117984322 +0000 UTC m=+1.213863284" Jul 2 07:55:32.128702 kubelet[2521]: I0702 07:55:32.128665 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-cc7572d280" podStartSLOduration=1.128622814 podStartE2EDuration="1.128622814s" podCreationTimestamp="2024-07-02 07:55:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:32.117924722 +0000 UTC m=+1.213803684" watchObservedRunningTime="2024-07-02 07:55:32.128622814 +0000 UTC m=+1.224501676" Jul 2 07:55:36.154168 sudo[1815]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:36.153000 audit[1815]: USER_END pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.159244 kernel: kauditd_printk_skb: 319 callbacks suppressed Jul 2 07:55:36.159320 kernel: audit: type=1106 audit(1719906936.153:787): pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.157000 audit[1815]: CRED_DISP pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.176144 kernel: audit: type=1104 audit(1719906936.157:788): pid=1815 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.262925 sshd[1812]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:36.263000 audit[1812]: USER_END pid=1812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:36.267264 systemd[1]: sshd@6-10.200.8.38:22-10.200.16.10:34238.service: Deactivated successfully. Jul 2 07:55:36.268058 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:55:36.268207 systemd[1]: session-9.scope: Consumed 4.395s CPU time. Jul 2 07:55:36.269473 systemd-logind[1395]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:55:36.270547 systemd-logind[1395]: Removed session 9. Jul 2 07:55:36.263000 audit[1812]: CRED_DISP pid=1812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:36.299173 kernel: audit: type=1106 audit(1719906936.263:789): pid=1812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:36.299272 kernel: audit: type=1104 audit(1719906936.263:790): pid=1812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:55:36.299304 kernel: audit: type=1131 audit(1719906936.263:791): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.16.10:34238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.16.10:34238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.963000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.963000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.996744 kernel: audit: type=1400 audit(1719906942.963:792): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.996883 kernel: audit: type=1400 audit(1719906942.963:793): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.963000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c91b00 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:43.018385 kernel: audit: type=1300 audit(1719906942.963:793): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c91b00 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:43.018499 kernel: audit: type=1327 audit(1719906942.963:793): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:42.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:42.963000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:43.051813 kernel: audit: type=1400 audit(1719906942.963:794): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.963000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c91cc0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:43.074336 kernel: audit: type=1300 audit(1719906942.963:794): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c91cc0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:42.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:42.963000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c91180 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:43.113656 kernel: audit: type=1327 audit(1719906942.963:794): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:43.113786 kernel: audit: type=1300 audit(1719906942.963:792): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c91180 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:43.113821 kernel: audit: type=1327 audit(1719906942.963:792): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:42.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:42.963000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:43.147110 kernel: audit: type=1400 audit(1719906942.963:795): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:42.963000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c91e80 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:55:42.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:43.432499 kubelet[2521]: I0702 07:55:43.432463 2521 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:55:43.433072 env[1407]: time="2024-07-02T07:55:43.432954322Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:55:43.433450 kubelet[2521]: I0702 07:55:43.433206 2521 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:55:44.013429 kubelet[2521]: I0702 07:55:44.013381 2521 topology_manager.go:215] "Topology Admit Handler" podUID="48212ad0-c007-4ae2-9dae-f95d6780c5df" podNamespace="kube-system" podName="kube-proxy-68lbv" Jul 2 07:55:44.020608 systemd[1]: Created slice kubepods-besteffort-pod48212ad0_c007_4ae2_9dae_f95d6780c5df.slice. Jul 2 07:55:44.123469 kubelet[2521]: I0702 07:55:44.123423 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nscng\" (UniqueName: \"kubernetes.io/projected/48212ad0-c007-4ae2-9dae-f95d6780c5df-kube-api-access-nscng\") pod \"kube-proxy-68lbv\" (UID: \"48212ad0-c007-4ae2-9dae-f95d6780c5df\") " pod="kube-system/kube-proxy-68lbv" Jul 2 07:55:44.123767 kubelet[2521]: I0702 07:55:44.123736 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/48212ad0-c007-4ae2-9dae-f95d6780c5df-lib-modules\") pod \"kube-proxy-68lbv\" (UID: \"48212ad0-c007-4ae2-9dae-f95d6780c5df\") " pod="kube-system/kube-proxy-68lbv" Jul 2 07:55:44.123861 kubelet[2521]: I0702 07:55:44.123799 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/48212ad0-c007-4ae2-9dae-f95d6780c5df-kube-proxy\") pod \"kube-proxy-68lbv\" (UID: \"48212ad0-c007-4ae2-9dae-f95d6780c5df\") " pod="kube-system/kube-proxy-68lbv" Jul 2 07:55:44.123861 kubelet[2521]: I0702 07:55:44.123834 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/48212ad0-c007-4ae2-9dae-f95d6780c5df-xtables-lock\") pod \"kube-proxy-68lbv\" (UID: \"48212ad0-c007-4ae2-9dae-f95d6780c5df\") " pod="kube-system/kube-proxy-68lbv" Jul 2 07:55:44.232190 kubelet[2521]: E0702 07:55:44.232141 2521 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Jul 2 07:55:44.232190 kubelet[2521]: E0702 07:55:44.232187 2521 projected.go:200] Error preparing data for projected volume kube-api-access-nscng for pod kube-system/kube-proxy-68lbv: configmap "kube-root-ca.crt" not found Jul 2 07:55:44.232435 kubelet[2521]: E0702 07:55:44.232273 2521 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/48212ad0-c007-4ae2-9dae-f95d6780c5df-kube-api-access-nscng podName:48212ad0-c007-4ae2-9dae-f95d6780c5df nodeName:}" failed. No retries permitted until 2024-07-02 07:55:44.732242818 +0000 UTC m=+13.828121680 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-nscng" (UniqueName: "kubernetes.io/projected/48212ad0-c007-4ae2-9dae-f95d6780c5df-kube-api-access-nscng") pod "kube-proxy-68lbv" (UID: "48212ad0-c007-4ae2-9dae-f95d6780c5df") : configmap "kube-root-ca.crt" not found Jul 2 07:55:44.582661 kubelet[2521]: I0702 07:55:44.582617 2521 topology_manager.go:215] "Topology Admit Handler" podUID="19c6490a-ddec-4fc8-9ce5-58c48d400326" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-8m678" Jul 2 07:55:44.589066 systemd[1]: Created slice kubepods-besteffort-pod19c6490a_ddec_4fc8_9ce5_58c48d400326.slice. Jul 2 07:55:44.627834 kubelet[2521]: I0702 07:55:44.627789 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rhlhg\" (UniqueName: \"kubernetes.io/projected/19c6490a-ddec-4fc8-9ce5-58c48d400326-kube-api-access-rhlhg\") pod \"tigera-operator-76c4974c85-8m678\" (UID: \"19c6490a-ddec-4fc8-9ce5-58c48d400326\") " pod="tigera-operator/tigera-operator-76c4974c85-8m678" Jul 2 07:55:44.628136 kubelet[2521]: I0702 07:55:44.628119 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/19c6490a-ddec-4fc8-9ce5-58c48d400326-var-lib-calico\") pod \"tigera-operator-76c4974c85-8m678\" (UID: \"19c6490a-ddec-4fc8-9ce5-58c48d400326\") " pod="tigera-operator/tigera-operator-76c4974c85-8m678" Jul 2 07:55:44.892941 env[1407]: time="2024-07-02T07:55:44.892891600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-8m678,Uid:19c6490a-ddec-4fc8-9ce5-58c48d400326,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:55:44.931976 env[1407]: time="2024-07-02T07:55:44.931782763Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:44.931976 env[1407]: time="2024-07-02T07:55:44.931833764Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:44.931976 env[1407]: time="2024-07-02T07:55:44.931850464Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:44.932372 env[1407]: time="2024-07-02T07:55:44.932326967Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b pid=2605 runtime=io.containerd.runc.v2 Jul 2 07:55:44.938754 env[1407]: time="2024-07-02T07:55:44.938703710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-68lbv,Uid:48212ad0-c007-4ae2-9dae-f95d6780c5df,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:44.955093 systemd[1]: Started cri-containerd-0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b.scope. Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.970000 audit: BPF prog-id=104 op=LOAD Jul 2 07:55:44.970000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.970000 audit[2614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2605 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396136343963643962643864373838623739366534303466356130 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2605 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396136343963643962643864373838623739366534303466356130 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.971000 audit: BPF prog-id=105 op=LOAD Jul 2 07:55:44.971000 audit[2614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000305420 items=0 ppid=2605 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396136343963643962643864373838623739366534303466356130 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit: BPF prog-id=106 op=LOAD Jul 2 07:55:44.972000 audit[2614]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000305468 items=0 ppid=2605 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396136343963643962643864373838623739366534303466356130 Jul 2 07:55:44.972000 audit: BPF prog-id=106 op=UNLOAD Jul 2 07:55:44.972000 audit: BPF prog-id=105 op=UNLOAD Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:44.972000 audit: BPF prog-id=107 op=LOAD Jul 2 07:55:44.972000 audit[2614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000305878 items=0 ppid=2605 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:44.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396136343963643962643864373838623739366534303466356130 Jul 2 07:55:44.988118 env[1407]: time="2024-07-02T07:55:44.986515735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:44.988118 env[1407]: time="2024-07-02T07:55:44.986594635Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:44.988118 env[1407]: time="2024-07-02T07:55:44.986621136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:44.988118 env[1407]: time="2024-07-02T07:55:44.986765836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/026067b475c0c4b73d62346cde34dc42125b03c1a665e3fef8a0962f45807020 pid=2637 runtime=io.containerd.runc.v2 Jul 2 07:55:45.009323 systemd[1]: Started cri-containerd-026067b475c0c4b73d62346cde34dc42125b03c1a665e3fef8a0962f45807020.scope. Jul 2 07:55:45.031154 env[1407]: time="2024-07-02T07:55:45.029762125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-8m678,Uid:19c6490a-ddec-4fc8-9ce5-58c48d400326,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b\"" Jul 2 07:55:45.032871 env[1407]: time="2024-07-02T07:55:45.032835045Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.033000 audit: BPF prog-id=108 op=LOAD Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2637 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363036376234373563306334623733643632333436636465333464 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2637 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363036376234373563306334623733643632333436636465333464 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.034000 audit: BPF prog-id=109 op=LOAD Jul 2 07:55:45.034000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fdd90 items=0 ppid=2637 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363036376234373563306334623733643632333436636465333464 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit: BPF prog-id=110 op=LOAD Jul 2 07:55:45.035000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fddd8 items=0 ppid=2637 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363036376234373563306334623733643632333436636465333464 Jul 2 07:55:45.035000 audit: BPF prog-id=110 op=UNLOAD Jul 2 07:55:45.035000 audit: BPF prog-id=109 op=UNLOAD Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.035000 audit: BPF prog-id=111 op=LOAD Jul 2 07:55:45.035000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002d81e8 items=0 ppid=2637 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363036376234373563306334623733643632333436636465333464 Jul 2 07:55:45.053557 env[1407]: time="2024-07-02T07:55:45.053506483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-68lbv,Uid:48212ad0-c007-4ae2-9dae-f95d6780c5df,Namespace:kube-system,Attempt:0,} returns sandbox id \"026067b475c0c4b73d62346cde34dc42125b03c1a665e3fef8a0962f45807020\"" Jul 2 07:55:45.057729 env[1407]: time="2024-07-02T07:55:45.057693811Z" level=info msg="CreateContainer within sandbox \"026067b475c0c4b73d62346cde34dc42125b03c1a665e3fef8a0962f45807020\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:55:45.094968 env[1407]: time="2024-07-02T07:55:45.094921959Z" level=info msg="CreateContainer within sandbox \"026067b475c0c4b73d62346cde34dc42125b03c1a665e3fef8a0962f45807020\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"35c90c200551c3f9fba4445cb3f48b64304c1510b694f25eba89e974e4283284\"" Jul 2 07:55:45.097507 env[1407]: time="2024-07-02T07:55:45.095694564Z" level=info msg="StartContainer for \"35c90c200551c3f9fba4445cb3f48b64304c1510b694f25eba89e974e4283284\"" Jul 2 07:55:45.114443 systemd[1]: Started cri-containerd-35c90c200551c3f9fba4445cb3f48b64304c1510b694f25eba89e974e4283284.scope. Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fd75974dc28 items=0 ppid=2637 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633930633230303535316333663966626134343435636233663438 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.137000 audit: BPF prog-id=112 op=LOAD Jul 2 07:55:45.137000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b68a8 items=0 ppid=2637 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633930633230303535316333663966626134343435636233663438 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.138000 audit: BPF prog-id=113 op=LOAD Jul 2 07:55:45.138000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b68f8 items=0 ppid=2637 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633930633230303535316333663966626134343435636233663438 Jul 2 07:55:45.138000 audit: BPF prog-id=113 op=UNLOAD Jul 2 07:55:45.139000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.139000 audit: BPF prog-id=114 op=LOAD Jul 2 07:55:45.139000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b6988 items=0 ppid=2637 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633930633230303535316333663966626134343435636233663438 Jul 2 07:55:45.159656 env[1407]: time="2024-07-02T07:55:45.159521789Z" level=info msg="StartContainer for \"35c90c200551c3f9fba4445cb3f48b64304c1510b694f25eba89e974e4283284\" returns successfully" Jul 2 07:55:45.217000 audit[2738]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.217000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee3502c10 a2=0 a3=7ffee3502bfc items=0 ppid=2698 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:45.219000 audit[2739]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.219000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7c690aa0 a2=0 a3=7ffe7c690a8c items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:45.221000 audit[2740]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.221000 audit[2740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8123c0f0 a2=0 a3=7fff8123c0dc items=0 ppid=2698 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:45.222000 audit[2741]: NETFILTER_CFG table=mangle:47 family=2 entries=1 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.222000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5e196a30 a2=0 a3=7ffc5e196a1c items=0 ppid=2698 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:45.224000 audit[2742]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.224000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe40a428d0 a2=0 a3=7ffe40a428bc items=0 ppid=2698 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:45.227000 audit[2743]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.227000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd022fe2c0 a2=0 a3=7ffd022fe2ac items=0 ppid=2698 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:45.321000 audit[2744]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.321000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff39aea240 a2=0 a3=7fff39aea22c items=0 ppid=2698 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:45.325000 audit[2746]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.325000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc23987480 a2=0 a3=7ffc2398746c items=0 ppid=2698 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:55:45.329000 audit[2749]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.329000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff82d9fa90 a2=0 a3=7fff82d9fa7c items=0 ppid=2698 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:55:45.331000 audit[2750]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.331000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd860337e0 a2=0 a3=7ffd860337cc items=0 ppid=2698 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:45.333000 audit[2752]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.333000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde9ae9cd0 a2=0 a3=7ffde9ae9cbc items=0 ppid=2698 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:45.335000 audit[2753]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.335000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec432e500 a2=0 a3=7ffec432e4ec items=0 ppid=2698 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:45.337000 audit[2755]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.337000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd113ac7b0 a2=0 a3=7ffd113ac79c items=0 ppid=2698 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:45.341000 audit[2758]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.341000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdfb99cbb0 a2=0 a3=7ffdfb99cb9c items=0 ppid=2698 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:55:45.342000 audit[2759]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.342000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd392bd630 a2=0 a3=7ffd392bd61c items=0 ppid=2698 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:45.344000 audit[2761]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.344000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe452fd5e0 a2=0 a3=7ffe452fd5cc items=0 ppid=2698 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:45.346000 audit[2762]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.346000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaef88df0 a2=0 a3=7ffeaef88ddc items=0 ppid=2698 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:45.348000 audit[2764]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.348000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1ca9c650 a2=0 a3=7fff1ca9c63c items=0 ppid=2698 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:45.352000 audit[2767]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.352000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd653cbdd0 a2=0 a3=7ffd653cbdbc items=0 ppid=2698 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:45.355000 audit[2770]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.355000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffabf1d380 a2=0 a3=7fffabf1d36c items=0 ppid=2698 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:45.357000 audit[2771]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.357000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc75841900 a2=0 a3=7ffc758418ec items=0 ppid=2698 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:45.359000 audit[2773]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.359000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc3af27500 a2=0 a3=7ffc3af274ec items=0 ppid=2698 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:45.363000 audit[2776]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.363000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaba8b710 a2=0 a3=7ffeaba8b6fc items=0 ppid=2698 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:45.364000 audit[2777]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.364000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6d9a06d0 a2=0 a3=7fff6d9a06bc items=0 ppid=2698 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:45.367000 audit[2779]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.367000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc9928ae00 a2=0 a3=7ffc9928adec items=0 ppid=2698 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:45.403000 audit[2785]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:45.403000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffed768f110 a2=0 a3=7ffed768f0fc items=0 ppid=2698 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:45.447000 audit[2785]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:45.447000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffed768f110 a2=0 a3=7ffed768f0fc items=0 ppid=2698 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:45.451000 audit[2791]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.451000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffec054c200 a2=0 a3=7ffec054c1ec items=0 ppid=2698 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:45.454000 audit[2793]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.454000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe516f7030 a2=0 a3=7ffe516f701c items=0 ppid=2698 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:55:45.458000 audit[2796]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.458000 audit[2796]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed55febf0 a2=0 a3=7ffed55febdc items=0 ppid=2698 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:55:45.459000 audit[2797]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.459000 audit[2797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2e572a10 a2=0 a3=7ffd2e5729fc items=0 ppid=2698 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:45.462000 audit[2799]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.462000 audit[2799]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdddfb8f30 a2=0 a3=7ffdddfb8f1c items=0 ppid=2698 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:45.463000 audit[2800]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.463000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a346f20 a2=0 a3=7fff5a346f0c items=0 ppid=2698 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:45.465000 audit[2802]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.465000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcf841240 a2=0 a3=7ffdcf84122c items=0 ppid=2698 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:55:45.469000 audit[2805]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.469000 audit[2805]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd4bcd9cd0 a2=0 a3=7ffd4bcd9cbc items=0 ppid=2698 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:45.470000 audit[2806]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.470000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc32557c0 a2=0 a3=7ffcc32557ac items=0 ppid=2698 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:45.473000 audit[2808]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.473000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0738bab0 a2=0 a3=7ffd0738ba9c items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:45.474000 audit[2809]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.474000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4dae37c0 a2=0 a3=7fff4dae37ac items=0 ppid=2698 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:45.477000 audit[2811]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.477000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee1264930 a2=0 a3=7ffee126491c items=0 ppid=2698 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:45.480000 audit[2814]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.480000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2b86a410 a2=0 a3=7ffe2b86a3fc items=0 ppid=2698 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:45.484000 audit[2817]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.484000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff97e62810 a2=0 a3=7fff97e627fc items=0 ppid=2698 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:55:45.485000 audit[2818]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.485000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdba876500 a2=0 a3=7ffdba8764ec items=0 ppid=2698 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:45.487000 audit[2820]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.487000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd532a8cf0 a2=0 a3=7ffd532a8cdc items=0 ppid=2698 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:45.491000 audit[2823]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.491000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff80170190 a2=0 a3=7fff8017017c items=0 ppid=2698 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:45.492000 audit[2824]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.492000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd289d7bc0 a2=0 a3=7ffd289d7bac items=0 ppid=2698 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:45.496000 audit[2826]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.496000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcf3e157d0 a2=0 a3=7ffcf3e157bc items=0 ppid=2698 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:45.497000 audit[2827]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.497000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9204e940 a2=0 a3=7ffe9204e92c items=0 ppid=2698 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:45.500000 audit[2829]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.500000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5efd26d0 a2=0 a3=7ffd5efd26bc items=0 ppid=2698 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:45.503000 audit[2832]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.503000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff64135cd0 a2=0 a3=7fff64135cbc items=0 ppid=2698 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:45.506000 audit[2834]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:45.506000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd9f55a640 a2=0 a3=7ffd9f55a62c items=0 ppid=2698 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.506000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:45.506000 audit[2834]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:45.506000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd9f55a640 a2=0 a3=7ffd9f55a62c items=0 ppid=2698 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.506000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:46.739899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2944612281.mount: Deactivated successfully. Jul 2 07:55:47.457707 env[1407]: time="2024-07-02T07:55:47.457649269Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:47.467776 env[1407]: time="2024-07-02T07:55:47.467737234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:47.475520 env[1407]: time="2024-07-02T07:55:47.475486484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:47.480684 env[1407]: time="2024-07-02T07:55:47.480652817Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:47.481176 env[1407]: time="2024-07-02T07:55:47.481144920Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:55:47.484510 env[1407]: time="2024-07-02T07:55:47.484478042Z" level=info msg="CreateContainer within sandbox \"0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:55:47.521332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2051891427.mount: Deactivated successfully. Jul 2 07:55:47.536123 env[1407]: time="2024-07-02T07:55:47.536075073Z" level=info msg="CreateContainer within sandbox \"0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d\"" Jul 2 07:55:47.538762 env[1407]: time="2024-07-02T07:55:47.536674977Z" level=info msg="StartContainer for \"fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d\"" Jul 2 07:55:47.562459 systemd[1]: Started cri-containerd-fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d.scope. Jul 2 07:55:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.574000 audit: BPF prog-id=115 op=LOAD Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2605 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653035336138376666356537363237316161323165333735386266 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2605 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653035336138376666356537363237316161323165333735386266 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit: BPF prog-id=116 op=LOAD Jul 2 07:55:47.575000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002401b0 items=0 ppid=2605 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653035336138376666356537363237316161323165333735386266 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit: BPF prog-id=117 op=LOAD Jul 2 07:55:47.575000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002401f8 items=0 ppid=2605 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653035336138376666356537363237316161323165333735386266 Jul 2 07:55:47.575000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:55:47.575000 audit: BPF prog-id=116 op=UNLOAD Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:47.575000 audit: BPF prog-id=118 op=LOAD Jul 2 07:55:47.575000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000240608 items=0 ppid=2605 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653035336138376666356537363237316161323165333735386266 Jul 2 07:55:47.595534 env[1407]: time="2024-07-02T07:55:47.595451055Z" level=info msg="StartContainer for \"fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d\" returns successfully" Jul 2 07:55:48.103082 kubelet[2521]: I0702 07:55:48.103043 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-68lbv" podStartSLOduration=4.102991005 podStartE2EDuration="4.102991005s" podCreationTimestamp="2024-07-02 07:55:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:46.104595172 +0000 UTC m=+15.200474134" watchObservedRunningTime="2024-07-02 07:55:48.102991005 +0000 UTC m=+17.198869967" Jul 2 07:55:50.316000 audit[2874]: NETFILTER_CFG table=filter:95 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.322217 kernel: kauditd_printk_skb: 369 callbacks suppressed Jul 2 07:55:50.322313 kernel: audit: type=1325 audit(1719906950.316:907): table=filter:95 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.316000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff26638730 a2=0 a3=7fff2663871c items=0 ppid=2698 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.353575 kernel: audit: type=1300 audit(1719906950.316:907): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff26638730 a2=0 a3=7fff2663871c items=0 ppid=2698 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.353697 kernel: audit: type=1327 audit(1719906950.316:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.352000 audit[2874]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.376643 kernel: audit: type=1325 audit(1719906950.352:908): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.376784 kernel: audit: type=1300 audit(1719906950.352:908): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff26638730 a2=0 a3=0 items=0 ppid=2698 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.352000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff26638730 a2=0 a3=0 items=0 ppid=2698 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.395421 kernel: audit: type=1327 audit(1719906950.352:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.364000 audit[2876]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.414536 kernel: audit: type=1325 audit(1719906950.364:909): table=filter:97 family=2 entries=15 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.416508 kernel: audit: type=1300 audit(1719906950.364:909): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe6834fd90 a2=0 a3=7ffe6834fd7c items=0 ppid=2698 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.364000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe6834fd90 a2=0 a3=7ffe6834fd7c items=0 ppid=2698 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.445163 kernel: audit: type=1327 audit(1719906950.364:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.445265 kernel: audit: type=1325 audit(1719906950.433:910): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.433000 audit[2876]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.433000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe6834fd90 a2=0 a3=0 items=0 ppid=2698 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.494140 kubelet[2521]: I0702 07:55:50.494093 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-8m678" podStartSLOduration=4.044887204 podStartE2EDuration="6.494028785s" podCreationTimestamp="2024-07-02 07:55:44 +0000 UTC" firstStartedPulling="2024-07-02 07:55:45.032345842 +0000 UTC m=+14.128224804" lastFinishedPulling="2024-07-02 07:55:47.481487423 +0000 UTC m=+16.577366385" observedRunningTime="2024-07-02 07:55:48.104410614 +0000 UTC m=+17.200289476" watchObservedRunningTime="2024-07-02 07:55:50.494028785 +0000 UTC m=+19.589907647" Jul 2 07:55:50.495033 kubelet[2521]: I0702 07:55:50.495011 2521 topology_manager.go:215] "Topology Admit Handler" podUID="3a931a8a-332a-4944-b6c0-22da3286687f" podNamespace="calico-system" podName="calico-typha-7b4889d5d6-zfzg7" Jul 2 07:55:50.502731 systemd[1]: Created slice kubepods-besteffort-pod3a931a8a_332a_4944_b6c0_22da3286687f.slice. Jul 2 07:55:50.567788 kubelet[2521]: I0702 07:55:50.567739 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9x9wj\" (UniqueName: \"kubernetes.io/projected/3a931a8a-332a-4944-b6c0-22da3286687f-kube-api-access-9x9wj\") pod \"calico-typha-7b4889d5d6-zfzg7\" (UID: \"3a931a8a-332a-4944-b6c0-22da3286687f\") " pod="calico-system/calico-typha-7b4889d5d6-zfzg7" Jul 2 07:55:50.567788 kubelet[2521]: I0702 07:55:50.567796 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3a931a8a-332a-4944-b6c0-22da3286687f-tigera-ca-bundle\") pod \"calico-typha-7b4889d5d6-zfzg7\" (UID: \"3a931a8a-332a-4944-b6c0-22da3286687f\") " pod="calico-system/calico-typha-7b4889d5d6-zfzg7" Jul 2 07:55:50.568069 kubelet[2521]: I0702 07:55:50.567826 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3a931a8a-332a-4944-b6c0-22da3286687f-typha-certs\") pod \"calico-typha-7b4889d5d6-zfzg7\" (UID: \"3a931a8a-332a-4944-b6c0-22da3286687f\") " pod="calico-system/calico-typha-7b4889d5d6-zfzg7" Jul 2 07:55:50.573625 kubelet[2521]: I0702 07:55:50.573516 2521 topology_manager.go:215] "Topology Admit Handler" podUID="bcee2bbd-7428-4099-a1b5-b55f8a23a969" podNamespace="calico-system" podName="calico-node-6t55b" Jul 2 07:55:50.579713 systemd[1]: Created slice kubepods-besteffort-podbcee2bbd_7428_4099_a1b5_b55f8a23a969.slice. Jul 2 07:55:50.668394 kubelet[2521]: I0702 07:55:50.668346 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bcee2bbd-7428-4099-a1b5-b55f8a23a969-node-certs\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668589 kubelet[2521]: I0702 07:55:50.668412 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-var-run-calico\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668589 kubelet[2521]: I0702 07:55:50.668438 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-cni-log-dir\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668589 kubelet[2521]: I0702 07:55:50.668464 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kcr46\" (UniqueName: \"kubernetes.io/projected/bcee2bbd-7428-4099-a1b5-b55f8a23a969-kube-api-access-kcr46\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668589 kubelet[2521]: I0702 07:55:50.668524 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-var-lib-calico\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668589 kubelet[2521]: I0702 07:55:50.668565 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bcee2bbd-7428-4099-a1b5-b55f8a23a969-tigera-ca-bundle\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668823 kubelet[2521]: I0702 07:55:50.668601 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-cni-bin-dir\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668823 kubelet[2521]: I0702 07:55:50.668628 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-policysync\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668823 kubelet[2521]: I0702 07:55:50.668654 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-xtables-lock\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668823 kubelet[2521]: I0702 07:55:50.668686 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-lib-modules\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668823 kubelet[2521]: I0702 07:55:50.668718 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-flexvol-driver-host\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.668997 kubelet[2521]: I0702 07:55:50.668752 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bcee2bbd-7428-4099-a1b5-b55f8a23a969-cni-net-dir\") pod \"calico-node-6t55b\" (UID: \"bcee2bbd-7428-4099-a1b5-b55f8a23a969\") " pod="calico-system/calico-node-6t55b" Jul 2 07:55:50.729482 kubelet[2521]: I0702 07:55:50.729442 2521 topology_manager.go:215] "Topology Admit Handler" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" podNamespace="calico-system" podName="csi-node-driver-qjbnq" Jul 2 07:55:50.730375 kubelet[2521]: E0702 07:55:50.730177 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:55:50.769509 kubelet[2521]: I0702 07:55:50.769473 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/184f582f-9d58-4336-8c14-fe29411b6d43-registration-dir\") pod \"csi-node-driver-qjbnq\" (UID: \"184f582f-9d58-4336-8c14-fe29411b6d43\") " pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:55:50.770468 kubelet[2521]: I0702 07:55:50.770444 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/184f582f-9d58-4336-8c14-fe29411b6d43-socket-dir\") pod \"csi-node-driver-qjbnq\" (UID: \"184f582f-9d58-4336-8c14-fe29411b6d43\") " pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:55:50.771290 kubelet[2521]: I0702 07:55:50.771271 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/184f582f-9d58-4336-8c14-fe29411b6d43-kubelet-dir\") pod \"csi-node-driver-qjbnq\" (UID: \"184f582f-9d58-4336-8c14-fe29411b6d43\") " pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:55:50.771504 kubelet[2521]: I0702 07:55:50.771489 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/184f582f-9d58-4336-8c14-fe29411b6d43-varrun\") pod \"csi-node-driver-qjbnq\" (UID: \"184f582f-9d58-4336-8c14-fe29411b6d43\") " pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:55:50.771623 kubelet[2521]: I0702 07:55:50.771611 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hd52\" (UniqueName: \"kubernetes.io/projected/184f582f-9d58-4336-8c14-fe29411b6d43-kube-api-access-4hd52\") pod \"csi-node-driver-qjbnq\" (UID: \"184f582f-9d58-4336-8c14-fe29411b6d43\") " pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:55:50.781615 kubelet[2521]: E0702 07:55:50.781597 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.781756 kubelet[2521]: W0702 07:55:50.781740 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.781842 kubelet[2521]: E0702 07:55:50.781830 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.803895 kubelet[2521]: E0702 07:55:50.803875 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.804038 kubelet[2521]: W0702 07:55:50.804021 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.804143 kubelet[2521]: E0702 07:55:50.804131 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.806528 env[1407]: time="2024-07-02T07:55:50.806477191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b4889d5d6-zfzg7,Uid:3a931a8a-332a-4944-b6c0-22da3286687f,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:50.850925 env[1407]: time="2024-07-02T07:55:50.850723760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:50.850925 env[1407]: time="2024-07-02T07:55:50.850846261Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:50.850925 env[1407]: time="2024-07-02T07:55:50.850878761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:50.851876 env[1407]: time="2024-07-02T07:55:50.851827567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14697f175ba179ce9f41c43e142cf370c84ff9221a421adb07e821135b08169d pid=2889 runtime=io.containerd.runc.v2 Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.872436 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874275 kubelet[2521]: W0702 07:55:50.872463 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.872493 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.872824 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874275 kubelet[2521]: W0702 07:55:50.872838 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.872863 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.873146 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874275 kubelet[2521]: W0702 07:55:50.873158 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.873182 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874275 kubelet[2521]: E0702 07:55:50.873433 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874802 kubelet[2521]: W0702 07:55:50.873443 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.873463 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.873713 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874802 kubelet[2521]: W0702 07:55:50.873724 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.873742 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.873962 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874802 kubelet[2521]: W0702 07:55:50.873973 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.873989 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.874802 kubelet[2521]: E0702 07:55:50.874173 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.874802 kubelet[2521]: W0702 07:55:50.874183 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.874480 systemd[1]: Started cri-containerd-14697f175ba179ce9f41c43e142cf370c84ff9221a421adb07e821135b08169d.scope. Jul 2 07:55:50.876649 kubelet[2521]: E0702 07:55:50.874199 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.876649 kubelet[2521]: E0702 07:55:50.876163 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.876649 kubelet[2521]: W0702 07:55:50.876175 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.876649 kubelet[2521]: E0702 07:55:50.876260 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.877299 kubelet[2521]: E0702 07:55:50.876933 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.877299 kubelet[2521]: W0702 07:55:50.876946 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.877299 kubelet[2521]: E0702 07:55:50.877041 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.877299 kubelet[2521]: E0702 07:55:50.877182 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.877299 kubelet[2521]: W0702 07:55:50.877190 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.877299 kubelet[2521]: E0702 07:55:50.877273 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.877808 kubelet[2521]: E0702 07:55:50.877686 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.877808 kubelet[2521]: W0702 07:55:50.877699 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.877808 kubelet[2521]: E0702 07:55:50.877788 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.878237 kubelet[2521]: E0702 07:55:50.878076 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.878237 kubelet[2521]: W0702 07:55:50.878088 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.878387 kubelet[2521]: E0702 07:55:50.878376 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.878622 kubelet[2521]: E0702 07:55:50.878610 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.878717 kubelet[2521]: W0702 07:55:50.878706 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.878860 kubelet[2521]: E0702 07:55:50.878851 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.879065 kubelet[2521]: E0702 07:55:50.879054 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.879189 kubelet[2521]: W0702 07:55:50.879176 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.879340 kubelet[2521]: E0702 07:55:50.879331 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.879524 kubelet[2521]: E0702 07:55:50.879514 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.879609 kubelet[2521]: W0702 07:55:50.879599 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.879745 kubelet[2521]: E0702 07:55:50.879736 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.879931 kubelet[2521]: E0702 07:55:50.879920 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.880008 kubelet[2521]: W0702 07:55:50.879997 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.880178 kubelet[2521]: E0702 07:55:50.880166 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.880380 kubelet[2521]: E0702 07:55:50.880368 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.880485 kubelet[2521]: W0702 07:55:50.880472 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.880638 kubelet[2521]: E0702 07:55:50.880627 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.880856 kubelet[2521]: E0702 07:55:50.880843 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.880940 kubelet[2521]: W0702 07:55:50.880928 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.881091 kubelet[2521]: E0702 07:55:50.881081 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.881331 kubelet[2521]: E0702 07:55:50.881320 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.881428 kubelet[2521]: W0702 07:55:50.881416 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.881578 kubelet[2521]: E0702 07:55:50.881566 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.881839 kubelet[2521]: E0702 07:55:50.881817 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.882186 kubelet[2521]: W0702 07:55:50.882171 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.882361 kubelet[2521]: E0702 07:55:50.882349 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.882655 kubelet[2521]: E0702 07:55:50.882643 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.884300 kubelet[2521]: W0702 07:55:50.884286 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.884519 kubelet[2521]: E0702 07:55:50.884507 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.884808 kubelet[2521]: E0702 07:55:50.884796 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.885156 kubelet[2521]: W0702 07:55:50.885139 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.885328 kubelet[2521]: E0702 07:55:50.885317 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.885558 kubelet[2521]: E0702 07:55:50.885547 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.885994 env[1407]: time="2024-07-02T07:55:50.885957875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6t55b,Uid:bcee2bbd-7428-4099-a1b5-b55f8a23a969,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:50.886623 kubelet[2521]: W0702 07:55:50.886610 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.887635 kubelet[2521]: E0702 07:55:50.887621 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.888370 kubelet[2521]: E0702 07:55:50.888357 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.888470 kubelet[2521]: W0702 07:55:50.888458 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.891270 kubelet[2521]: E0702 07:55:50.891258 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.891898 kubelet[2521]: E0702 07:55:50.891885 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.892044 kubelet[2521]: W0702 07:55:50.892032 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.892165 kubelet[2521]: E0702 07:55:50.892156 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.906589 kubelet[2521]: E0702 07:55:50.906572 2521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:50.906589 kubelet[2521]: W0702 07:55:50.906586 2521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:50.906708 kubelet[2521]: E0702 07:55:50.906604 2521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.916000 audit: BPF prog-id=119 op=LOAD Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2889 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363937663137356261313739636539663431633433653134326366 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2889 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363937663137356261313739636539663431633433653134326366 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.917000 audit: BPF prog-id=120 op=LOAD Jul 2 07:55:50.917000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000378890 items=0 ppid=2889 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363937663137356261313739636539663431633433653134326366 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.918000 audit: BPF prog-id=121 op=LOAD Jul 2 07:55:50.918000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003788d8 items=0 ppid=2889 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363937663137356261313739636539663431633433653134326366 Jul 2 07:55:50.919000 audit: BPF prog-id=121 op=UNLOAD Jul 2 07:55:50.919000 audit: BPF prog-id=120 op=UNLOAD Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.919000 audit: BPF prog-id=122 op=LOAD Jul 2 07:55:50.919000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000378ce8 items=0 ppid=2889 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363937663137356261313739636539663431633433653134326366 Jul 2 07:55:50.931711 env[1407]: time="2024-07-02T07:55:50.931567954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:50.931819 env[1407]: time="2024-07-02T07:55:50.931746655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:50.931819 env[1407]: time="2024-07-02T07:55:50.931779255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:50.931978 env[1407]: time="2024-07-02T07:55:50.931938056Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa pid=2948 runtime=io.containerd.runc.v2 Jul 2 07:55:50.947028 systemd[1]: Started cri-containerd-81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa.scope. Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.970000 audit: BPF prog-id=123 op=LOAD Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831626532643732373661323465383735303161333039646366333632 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831626532643732373661323465383735303161333039646366333632 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit: BPF prog-id=124 op=LOAD Jul 2 07:55:50.971000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000345cd0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831626532643732373661323465383735303161333039646366333632 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit: BPF prog-id=125 op=LOAD Jul 2 07:55:50.971000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000345d18 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831626532643732373661323465383735303161333039646366333632 Jul 2 07:55:50.971000 audit: BPF prog-id=125 op=UNLOAD Jul 2 07:55:50.971000 audit: BPF prog-id=124 op=UNLOAD Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:50.971000 audit: BPF prog-id=126 op=LOAD Jul 2 07:55:50.971000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba128 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831626532643732373661323465383735303161333039646366333632 Jul 2 07:55:50.986658 env[1407]: time="2024-07-02T07:55:50.986594589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6t55b,Uid:bcee2bbd-7428-4099-a1b5-b55f8a23a969,Namespace:calico-system,Attempt:0,} returns sandbox id \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\"" Jul 2 07:55:50.988692 env[1407]: time="2024-07-02T07:55:50.988654602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:55:51.015350 env[1407]: time="2024-07-02T07:55:51.015305763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b4889d5d6-zfzg7,Uid:3a931a8a-332a-4944-b6c0-22da3286687f,Namespace:calico-system,Attempt:0,} returns sandbox id \"14697f175ba179ce9f41c43e142cf370c84ff9221a421adb07e821135b08169d\"" Jul 2 07:55:51.441000 audit[2987]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:51.441000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd2e1cb660 a2=0 a3=7ffd2e1cb64c items=0 ppid=2698 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:51.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:51.443000 audit[2987]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:51.443000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd2e1cb660 a2=0 a3=0 items=0 ppid=2698 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:51.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:52.855404 env[1407]: time="2024-07-02T07:55:52.855359813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.875372 env[1407]: time="2024-07-02T07:55:52.875320131Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.880592 env[1407]: time="2024-07-02T07:55:52.880551861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.888429 env[1407]: time="2024-07-02T07:55:52.888332207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:52.888939 env[1407]: time="2024-07-02T07:55:52.888899711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:55:52.890693 env[1407]: time="2024-07-02T07:55:52.890657621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:55:52.891923 env[1407]: time="2024-07-02T07:55:52.891882828Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:55:52.952944 env[1407]: time="2024-07-02T07:55:52.952894488Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c\"" Jul 2 07:55:52.954020 env[1407]: time="2024-07-02T07:55:52.953968194Z" level=info msg="StartContainer for \"0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c\"" Jul 2 07:55:52.986616 systemd[1]: Started cri-containerd-0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c.scope. Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7ee95c90e8 items=0 ppid=2948 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333437666536373530633262333364303739323933373162303437 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit: BPF prog-id=127 op=LOAD Jul 2 07:55:53.011000 audit[2996]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000220db8 items=0 ppid=2948 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333437666536373530633262333364303739323933373162303437 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit: BPF prog-id=128 op=LOAD Jul 2 07:55:53.011000 audit[2996]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000220e08 items=0 ppid=2948 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333437666536373530633262333364303739323933373162303437 Jul 2 07:55:53.011000 audit: BPF prog-id=128 op=UNLOAD Jul 2 07:55:53.011000 audit: BPF prog-id=127 op=UNLOAD Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { perfmon } for pid=2996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit[2996]: AVC avc: denied { bpf } for pid=2996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:53.011000 audit: BPF prog-id=129 op=LOAD Jul 2 07:55:53.011000 audit[2996]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000220e98 items=0 ppid=2948 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333437666536373530633262333364303739323933373162303437 Jul 2 07:55:53.022370 kubelet[2521]: E0702 07:55:53.022333 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:55:53.039369 env[1407]: time="2024-07-02T07:55:53.039321194Z" level=info msg="StartContainer for \"0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c\" returns successfully" Jul 2 07:55:53.053843 systemd[1]: cri-containerd-0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c.scope: Deactivated successfully. Jul 2 07:55:53.057000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:55:53.086681 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c-rootfs.mount: Deactivated successfully. Jul 2 07:55:53.902160 env[1407]: time="2024-07-02T07:55:53.902085000Z" level=info msg="shim disconnected" id=0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c Jul 2 07:55:53.902160 env[1407]: time="2024-07-02T07:55:53.902155400Z" level=warning msg="cleaning up after shim disconnected" id=0f347fe6750c2b33d07929371b047700f5f1655048b0440a1a631aaae1c0752c namespace=k8s.io Jul 2 07:55:53.902728 env[1407]: time="2024-07-02T07:55:53.902416102Z" level=info msg="cleaning up dead shim" Jul 2 07:55:53.924049 env[1407]: time="2024-07-02T07:55:53.924006927Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3036 runtime=io.containerd.runc.v2\n" Jul 2 07:55:55.020882 kubelet[2521]: E0702 07:55:55.020847 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:55:56.771836 env[1407]: time="2024-07-02T07:55:56.771779367Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:56.780540 env[1407]: time="2024-07-02T07:55:56.780488615Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:56.785407 env[1407]: time="2024-07-02T07:55:56.785377942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:56.791810 env[1407]: time="2024-07-02T07:55:56.791772678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:56.792313 env[1407]: time="2024-07-02T07:55:56.792286980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:55:56.795763 env[1407]: time="2024-07-02T07:55:56.795739499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:55:56.811675 env[1407]: time="2024-07-02T07:55:56.811630387Z" level=info msg="CreateContainer within sandbox \"14697f175ba179ce9f41c43e142cf370c84ff9221a421adb07e821135b08169d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:55:56.855148 env[1407]: time="2024-07-02T07:55:56.855079228Z" level=info msg="CreateContainer within sandbox \"14697f175ba179ce9f41c43e142cf370c84ff9221a421adb07e821135b08169d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4fc82dea90e79c034212ff5015d54b8f7608ec1943ae604c75abbd719268ec66\"" Jul 2 07:55:56.857583 env[1407]: time="2024-07-02T07:55:56.855893332Z" level=info msg="StartContainer for \"4fc82dea90e79c034212ff5015d54b8f7608ec1943ae604c75abbd719268ec66\"" Jul 2 07:55:56.881409 systemd[1]: Started cri-containerd-4fc82dea90e79c034212ff5015d54b8f7608ec1943ae604c75abbd719268ec66.scope. Jul 2 07:55:56.902149 kernel: kauditd_printk_skb: 166 callbacks suppressed Jul 2 07:55:56.902272 kernel: audit: type=1400 audit(1719906956.895:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.929157 kernel: audit: type=1400 audit(1719906956.895:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.943410 kernel: audit: type=1400 audit(1719906956.895:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.971310 kernel: audit: type=1400 audit(1719906956.895:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.971369 kernel: audit: type=1400 audit(1719906956.895:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.971400 kernel: audit: type=1400 audit(1719906956.895:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.998442 kernel: audit: type=1400 audit(1719906956.895:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:57.015141 kernel: audit: type=1400 audit(1719906956.895:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:57.022627 kubelet[2521]: E0702 07:55:57.021681 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:55:57.029230 kernel: audit: type=1400 audit(1719906956.895:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:57.043978 kernel: audit: type=1400 audit(1719906956.900:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.900000 audit: BPF prog-id=130 op=LOAD Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2889 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:56.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633832646561393065373963303334323132666635303135643534 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2889 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:56.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633832646561393065373963303334323132666635303135643534 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.906000 audit: BPF prog-id=131 op=LOAD Jul 2 07:55:56.906000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383dc0 items=0 ppid=2889 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:56.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633832646561393065373963303334323132666635303135643534 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.914000 audit: BPF prog-id=132 op=LOAD Jul 2 07:55:56.914000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383e08 items=0 ppid=2889 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:56.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633832646561393065373963303334323132666635303135643534 Jul 2 07:55:56.928000 audit: BPF prog-id=132 op=UNLOAD Jul 2 07:55:56.928000 audit: BPF prog-id=131 op=UNLOAD Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:56.928000 audit: BPF prog-id=133 op=LOAD Jul 2 07:55:56.928000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003de218 items=0 ppid=2889 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:56.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633832646561393065373963303334323132666635303135643534 Jul 2 07:55:57.048850 env[1407]: time="2024-07-02T07:55:57.048777395Z" level=info msg="StartContainer for \"4fc82dea90e79c034212ff5015d54b8f7608ec1943ae604c75abbd719268ec66\" returns successfully" Jul 2 07:55:57.147211 kubelet[2521]: I0702 07:55:57.147163 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7b4889d5d6-zfzg7" podStartSLOduration=1.370675517 podStartE2EDuration="7.147072631s" podCreationTimestamp="2024-07-02 07:55:50 +0000 UTC" firstStartedPulling="2024-07-02 07:55:51.016339869 +0000 UTC m=+20.112218731" lastFinishedPulling="2024-07-02 07:55:56.792736983 +0000 UTC m=+25.888615845" observedRunningTime="2024-07-02 07:55:57.146312127 +0000 UTC m=+26.242287689" watchObservedRunningTime="2024-07-02 07:55:57.147072631 +0000 UTC m=+26.242951593" Jul 2 07:55:58.125316 kubelet[2521]: I0702 07:55:58.125276 2521 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:55:59.021793 kubelet[2521]: E0702 07:55:59.021750 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:56:01.020922 kubelet[2521]: E0702 07:56:01.020887 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:56:02.820170 env[1407]: time="2024-07-02T07:56:02.820064430Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:02.825479 env[1407]: time="2024-07-02T07:56:02.825424857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:02.829082 env[1407]: time="2024-07-02T07:56:02.829017675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:02.835815 env[1407]: time="2024-07-02T07:56:02.835771109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:02.836397 env[1407]: time="2024-07-02T07:56:02.836365112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:56:02.840734 env[1407]: time="2024-07-02T07:56:02.840701634Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:56:02.890634 env[1407]: time="2024-07-02T07:56:02.890589087Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148\"" Jul 2 07:56:02.892684 env[1407]: time="2024-07-02T07:56:02.891326691Z" level=info msg="StartContainer for \"76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148\"" Jul 2 07:56:02.925747 systemd[1]: run-containerd-runc-k8s.io-76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148-runc.ZpxS66.mount: Deactivated successfully. Jul 2 07:56:02.929622 systemd[1]: Started cri-containerd-76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148.scope. Jul 2 07:56:02.967555 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:56:02.967692 kernel: audit: type=1400 audit(1719906962.948:974): avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b6d32f028 items=0 ppid=2948 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:02.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343336636266346430623862663332303030666231313930326534 Jul 2 07:56:03.006301 kernel: audit: type=1300 audit(1719906962.948:974): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b6d32f028 items=0 ppid=2948 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:03.006395 kernel: audit: type=1327 audit(1719906962.948:974): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343336636266346430623862663332303030666231313930326534 Jul 2 07:56:03.006425 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.019442 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.023334 kubelet[2521]: E0702 07:56:03.023312 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.047156 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.051763 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.055079 env[1407]: time="2024-07-02T07:56:03.055025116Z" level=info msg="StartContainer for \"76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148\" returns successfully" Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.078554 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.091417 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:03.091500 kernel: audit: type=1400 audit(1719906962.948:975): avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.948000 audit: BPF prog-id=134 op=LOAD Jul 2 07:56:02.948000 audit[3103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000372258 items=0 ppid=2948 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:02.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343336636266346430623862663332303030666231313930326534 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit: BPF prog-id=135 op=LOAD Jul 2 07:56:02.967000 audit[3103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003722a8 items=0 ppid=2948 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:02.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343336636266346430623862663332303030666231313930326534 Jul 2 07:56:02.967000 audit: BPF prog-id=135 op=UNLOAD Jul 2 07:56:02.967000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { perfmon } for pid=3103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit[3103]: AVC avc: denied { bpf } for pid=3103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:02.967000 audit: BPF prog-id=136 op=LOAD Jul 2 07:56:02.967000 audit[3103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000372338 items=0 ppid=2948 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:02.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343336636266346430623862663332303030666231313930326534 Jul 2 07:56:04.492619 env[1407]: time="2024-07-02T07:56:04.492527862Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:56:04.495326 systemd[1]: cri-containerd-76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148.scope: Deactivated successfully. Jul 2 07:56:04.500000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:56:04.516371 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148-rootfs.mount: Deactivated successfully. Jul 2 07:56:04.580132 kubelet[2521]: I0702 07:56:04.579841 2521 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.600906 2521 topology_manager.go:215] "Topology Admit Handler" podUID="d6027e72-ec48-47ef-b741-427622e0fec7" podNamespace="calico-system" podName="calico-kube-controllers-687b95697c-fscfd" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.612079 2521 topology_manager.go:215] "Topology Admit Handler" podUID="7c3fe036-a1c1-4514-b425-d329b446ee39" podNamespace="kube-system" podName="coredns-76f75df574-wq8n2" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.615418 2521 topology_manager.go:215] "Topology Admit Handler" podUID="38ede9b8-38f8-4e84-b230-9f876b10cfc8" podNamespace="kube-system" podName="coredns-76f75df574-4rb6j" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.621899 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7h82f\" (UniqueName: \"kubernetes.io/projected/d6027e72-ec48-47ef-b741-427622e0fec7-kube-api-access-7h82f\") pod \"calico-kube-controllers-687b95697c-fscfd\" (UID: \"d6027e72-ec48-47ef-b741-427622e0fec7\") " pod="calico-system/calico-kube-controllers-687b95697c-fscfd" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.622519 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d6027e72-ec48-47ef-b741-427622e0fec7-tigera-ca-bundle\") pod \"calico-kube-controllers-687b95697c-fscfd\" (UID: \"d6027e72-ec48-47ef-b741-427622e0fec7\") " pod="calico-system/calico-kube-controllers-687b95697c-fscfd" Jul 2 07:56:04.983669 kubelet[2521]: I0702 07:56:04.622572 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9qbtr\" (UniqueName: \"kubernetes.io/projected/38ede9b8-38f8-4e84-b230-9f876b10cfc8-kube-api-access-9qbtr\") pod \"coredns-76f75df574-4rb6j\" (UID: \"38ede9b8-38f8-4e84-b230-9f876b10cfc8\") " pod="kube-system/coredns-76f75df574-4rb6j" Jul 2 07:56:04.606796 systemd[1]: Created slice kubepods-besteffort-podd6027e72_ec48_47ef_b741_427622e0fec7.slice. Jul 2 07:56:04.984325 kubelet[2521]: I0702 07:56:04.623335 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkqxc\" (UniqueName: \"kubernetes.io/projected/7c3fe036-a1c1-4514-b425-d329b446ee39-kube-api-access-wkqxc\") pod \"coredns-76f75df574-wq8n2\" (UID: \"7c3fe036-a1c1-4514-b425-d329b446ee39\") " pod="kube-system/coredns-76f75df574-wq8n2" Jul 2 07:56:04.984325 kubelet[2521]: I0702 07:56:04.623388 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7c3fe036-a1c1-4514-b425-d329b446ee39-config-volume\") pod \"coredns-76f75df574-wq8n2\" (UID: \"7c3fe036-a1c1-4514-b425-d329b446ee39\") " pod="kube-system/coredns-76f75df574-wq8n2" Jul 2 07:56:04.984325 kubelet[2521]: I0702 07:56:04.623459 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/38ede9b8-38f8-4e84-b230-9f876b10cfc8-config-volume\") pod \"coredns-76f75df574-4rb6j\" (UID: \"38ede9b8-38f8-4e84-b230-9f876b10cfc8\") " pod="kube-system/coredns-76f75df574-4rb6j" Jul 2 07:56:04.619333 systemd[1]: Created slice kubepods-burstable-pod7c3fe036_a1c1_4514_b425_d329b446ee39.slice. Jul 2 07:56:04.627220 systemd[1]: Created slice kubepods-burstable-pod38ede9b8_38f8_4e84_b230_9f876b10cfc8.slice. Jul 2 07:56:05.027755 systemd[1]: Created slice kubepods-besteffort-pod184f582f_9d58_4336_8c14_fe29411b6d43.slice. Jul 2 07:56:05.034071 env[1407]: time="2024-07-02T07:56:05.033707326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qjbnq,Uid:184f582f-9d58-4336-8c14-fe29411b6d43,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:05.287050 env[1407]: time="2024-07-02T07:56:05.286881857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687b95697c-fscfd,Uid:d6027e72-ec48-47ef-b741-427622e0fec7,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:05.291647 env[1407]: time="2024-07-02T07:56:05.291508979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-4rb6j,Uid:38ede9b8-38f8-4e84-b230-9f876b10cfc8,Namespace:kube-system,Attempt:0,}" Jul 2 07:56:05.291800 env[1407]: time="2024-07-02T07:56:05.291518679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-wq8n2,Uid:7c3fe036-a1c1-4514-b425-d329b446ee39,Namespace:kube-system,Attempt:0,}" Jul 2 07:56:05.411684 kubelet[2521]: I0702 07:56:05.411634 2521 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:05.449000 audit[3154]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:05.449000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe5ce42350 a2=0 a3=7ffe5ce4233c items=0 ppid=2698 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:05.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:05.450000 audit[3154]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:05.450000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe5ce42350 a2=0 a3=7ffe5ce4233c items=0 ppid=2698 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:05.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:06.701193 env[1407]: time="2024-07-02T07:56:06.701133487Z" level=info msg="shim disconnected" id=76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148 Jul 2 07:56:06.701193 env[1407]: time="2024-07-02T07:56:06.701190887Z" level=warning msg="cleaning up after shim disconnected" id=76436cbf4d0b8bf32000fb11902e41c58877bb48d5b861be50cc65b4cbbf3148 namespace=k8s.io Jul 2 07:56:06.701193 env[1407]: time="2024-07-02T07:56:06.701202888Z" level=info msg="cleaning up dead shim" Jul 2 07:56:06.709985 env[1407]: time="2024-07-02T07:56:06.709943229Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:56:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3155 runtime=io.containerd.runc.v2\n" Jul 2 07:56:06.920291 env[1407]: time="2024-07-02T07:56:06.920205538Z" level=error msg="Failed to destroy network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.920717 env[1407]: time="2024-07-02T07:56:06.920647340Z" level=error msg="encountered an error cleaning up failed sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.920829 env[1407]: time="2024-07-02T07:56:06.920752141Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687b95697c-fscfd,Uid:d6027e72-ec48-47ef-b741-427622e0fec7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.921142 kubelet[2521]: E0702 07:56:06.921112 2521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.921548 kubelet[2521]: E0702 07:56:06.921199 2521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-687b95697c-fscfd" Jul 2 07:56:06.921548 kubelet[2521]: E0702 07:56:06.921232 2521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-687b95697c-fscfd" Jul 2 07:56:06.921548 kubelet[2521]: E0702 07:56:06.921323 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-687b95697c-fscfd_calico-system(d6027e72-ec48-47ef-b741-427622e0fec7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-687b95697c-fscfd_calico-system(d6027e72-ec48-47ef-b741-427622e0fec7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-687b95697c-fscfd" podUID="d6027e72-ec48-47ef-b741-427622e0fec7" Jul 2 07:56:06.964438 env[1407]: time="2024-07-02T07:56:06.964280450Z" level=error msg="Failed to destroy network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.965744 env[1407]: time="2024-07-02T07:56:06.965668556Z" level=error msg="encountered an error cleaning up failed sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.965886 env[1407]: time="2024-07-02T07:56:06.965774257Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-wq8n2,Uid:7c3fe036-a1c1-4514-b425-d329b446ee39,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.966113 kubelet[2521]: E0702 07:56:06.966080 2521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.966212 kubelet[2521]: E0702 07:56:06.966175 2521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-wq8n2" Jul 2 07:56:06.966212 kubelet[2521]: E0702 07:56:06.966207 2521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-wq8n2" Jul 2 07:56:06.966306 kubelet[2521]: E0702 07:56:06.966278 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-wq8n2_kube-system(7c3fe036-a1c1-4514-b425-d329b446ee39)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-wq8n2_kube-system(7c3fe036-a1c1-4514-b425-d329b446ee39)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-wq8n2" podUID="7c3fe036-a1c1-4514-b425-d329b446ee39" Jul 2 07:56:06.972018 env[1407]: time="2024-07-02T07:56:06.971967387Z" level=error msg="Failed to destroy network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.972351 env[1407]: time="2024-07-02T07:56:06.972307588Z" level=error msg="encountered an error cleaning up failed sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.972456 env[1407]: time="2024-07-02T07:56:06.972377289Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-4rb6j,Uid:38ede9b8-38f8-4e84-b230-9f876b10cfc8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.972623 kubelet[2521]: E0702 07:56:06.972602 2521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.972716 kubelet[2521]: E0702 07:56:06.972666 2521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-4rb6j" Jul 2 07:56:06.972716 kubelet[2521]: E0702 07:56:06.972695 2521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-4rb6j" Jul 2 07:56:06.972847 kubelet[2521]: E0702 07:56:06.972768 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-4rb6j_kube-system(38ede9b8-38f8-4e84-b230-9f876b10cfc8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-4rb6j_kube-system(38ede9b8-38f8-4e84-b230-9f876b10cfc8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-4rb6j" podUID="38ede9b8-38f8-4e84-b230-9f876b10cfc8" Jul 2 07:56:06.982486 env[1407]: time="2024-07-02T07:56:06.982450337Z" level=error msg="Failed to destroy network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.982790 env[1407]: time="2024-07-02T07:56:06.982749838Z" level=error msg="encountered an error cleaning up failed sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.982871 env[1407]: time="2024-07-02T07:56:06.982806439Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qjbnq,Uid:184f582f-9d58-4336-8c14-fe29411b6d43,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.983023 kubelet[2521]: E0702 07:56:06.982994 2521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:06.983119 kubelet[2521]: E0702 07:56:06.983045 2521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:56:06.983119 kubelet[2521]: E0702 07:56:06.983075 2521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qjbnq" Jul 2 07:56:06.983218 kubelet[2521]: E0702 07:56:06.983158 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qjbnq_calico-system(184f582f-9d58-4336-8c14-fe29411b6d43)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qjbnq_calico-system(184f582f-9d58-4336-8c14-fe29411b6d43)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:56:07.147509 kubelet[2521]: I0702 07:56:07.147468 2521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:07.150039 env[1407]: time="2024-07-02T07:56:07.148191723Z" level=info msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" Jul 2 07:56:07.150039 env[1407]: time="2024-07-02T07:56:07.150013432Z" level=info msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" Jul 2 07:56:07.150246 kubelet[2521]: I0702 07:56:07.149537 2521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:07.153766 kubelet[2521]: I0702 07:56:07.153340 2521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:07.154073 env[1407]: time="2024-07-02T07:56:07.154039751Z" level=info msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" Jul 2 07:56:07.158765 kubelet[2521]: I0702 07:56:07.158725 2521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:07.159836 env[1407]: time="2024-07-02T07:56:07.159784378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:56:07.160041 env[1407]: time="2024-07-02T07:56:07.159584777Z" level=info msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" Jul 2 07:56:07.261150 env[1407]: time="2024-07-02T07:56:07.259240049Z" level=error msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" failed" error="failed to destroy network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:07.264869 env[1407]: time="2024-07-02T07:56:07.264702075Z" level=error msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" failed" error="failed to destroy network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:07.265408 kubelet[2521]: E0702 07:56:07.265205 2521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:07.265408 kubelet[2521]: E0702 07:56:07.265294 2521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8"} Jul 2 07:56:07.265408 kubelet[2521]: E0702 07:56:07.265341 2521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38ede9b8-38f8-4e84-b230-9f876b10cfc8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:07.265408 kubelet[2521]: E0702 07:56:07.265375 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38ede9b8-38f8-4e84-b230-9f876b10cfc8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-4rb6j" podUID="38ede9b8-38f8-4e84-b230-9f876b10cfc8" Jul 2 07:56:07.266113 kubelet[2521]: E0702 07:56:07.265946 2521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:07.266113 kubelet[2521]: E0702 07:56:07.265981 2521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627"} Jul 2 07:56:07.266113 kubelet[2521]: E0702 07:56:07.266024 2521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"184f582f-9d58-4336-8c14-fe29411b6d43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:07.266113 kubelet[2521]: E0702 07:56:07.266058 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"184f582f-9d58-4336-8c14-fe29411b6d43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qjbnq" podUID="184f582f-9d58-4336-8c14-fe29411b6d43" Jul 2 07:56:07.270883 env[1407]: time="2024-07-02T07:56:07.270841604Z" level=error msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" failed" error="failed to destroy network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:07.271227 env[1407]: time="2024-07-02T07:56:07.271132605Z" level=error msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" failed" error="failed to destroy network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:07.271578 kubelet[2521]: E0702 07:56:07.271439 2521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:07.271578 kubelet[2521]: E0702 07:56:07.271472 2521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465"} Jul 2 07:56:07.271578 kubelet[2521]: E0702 07:56:07.271514 2521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c3fe036-a1c1-4514-b425-d329b446ee39\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:07.271578 kubelet[2521]: E0702 07:56:07.271546 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c3fe036-a1c1-4514-b425-d329b446ee39\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-wq8n2" podUID="7c3fe036-a1c1-4514-b425-d329b446ee39" Jul 2 07:56:07.272201 kubelet[2521]: E0702 07:56:07.272035 2521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:07.272201 kubelet[2521]: E0702 07:56:07.272066 2521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4"} Jul 2 07:56:07.272201 kubelet[2521]: E0702 07:56:07.272130 2521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d6027e72-ec48-47ef-b741-427622e0fec7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:07.272201 kubelet[2521]: E0702 07:56:07.272166 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d6027e72-ec48-47ef-b741-427622e0fec7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-687b95697c-fscfd" podUID="d6027e72-ec48-47ef-b741-427622e0fec7" Jul 2 07:56:07.775330 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465-shm.mount: Deactivated successfully. Jul 2 07:56:07.775657 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4-shm.mount: Deactivated successfully. Jul 2 07:56:07.775755 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627-shm.mount: Deactivated successfully. Jul 2 07:56:14.922013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3118064919.mount: Deactivated successfully. Jul 2 07:56:14.989405 env[1407]: time="2024-07-02T07:56:14.989327100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:14.995089 env[1407]: time="2024-07-02T07:56:14.995047824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:14.998785 env[1407]: time="2024-07-02T07:56:14.998747141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:15.002148 env[1407]: time="2024-07-02T07:56:15.002078455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:15.002654 env[1407]: time="2024-07-02T07:56:15.002622957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:56:15.020453 env[1407]: time="2024-07-02T07:56:15.019503030Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:56:15.057140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2153297624.mount: Deactivated successfully. Jul 2 07:56:15.071299 env[1407]: time="2024-07-02T07:56:15.071248853Z" level=info msg="CreateContainer within sandbox \"81be2d7276a24e87501a309dcf3628188a59941ffbee71794d3295a9ae8605aa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811\"" Jul 2 07:56:15.071985 env[1407]: time="2024-07-02T07:56:15.071935356Z" level=info msg="StartContainer for \"d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811\"" Jul 2 07:56:15.092023 systemd[1]: Started cri-containerd-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811.scope. Jul 2 07:56:15.129867 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 07:56:15.130019 kernel: audit: type=1400 audit(1719906975.111:983): avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.111000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.111000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6e61d1a2f8 items=0 ppid=2948 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436616233653531663136646130623064346239323563343233333561 Jul 2 07:56:15.169914 kernel: audit: type=1300 audit(1719906975.111:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6e61d1a2f8 items=0 ppid=2948 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.170057 kernel: audit: type=1327 audit(1719906975.111:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436616233653531663136646130623064346239323563343233333561 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.186201 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.188289 env[1407]: time="2024-07-02T07:56:15.187946656Z" level=info msg="StartContainer for \"d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811\" returns successfully" Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.220560 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.220701 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.220729 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.259266 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.259390 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.271961 kernel: audit: type=1400 audit(1719906975.115:984): avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.115000 audit: BPF prog-id=137 op=LOAD Jul 2 07:56:15.115000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024258 items=0 ppid=2948 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436616233653531663136646130623064346239323563343233333561 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.129000 audit: BPF prog-id=138 op=LOAD Jul 2 07:56:15.129000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000242a8 items=0 ppid=2948 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436616233653531663136646130623064346239323563343233333561 Jul 2 07:56:15.129000 audit: BPF prog-id=138 op=UNLOAD Jul 2 07:56:15.130000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:15.130000 audit: BPF prog-id=139 op=LOAD Jul 2 07:56:15.130000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024338 items=0 ppid=2948 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436616233653531663136646130623064346239323563343233333561 Jul 2 07:56:15.666046 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:56:15.666297 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:56:16.209430 kubelet[2521]: I0702 07:56:16.209379 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-6t55b" podStartSLOduration=2.194469287 podStartE2EDuration="26.209314148s" podCreationTimestamp="2024-07-02 07:55:50 +0000 UTC" firstStartedPulling="2024-07-02 07:55:50.988077298 +0000 UTC m=+20.083956160" lastFinishedPulling="2024-07-02 07:56:15.002922159 +0000 UTC m=+44.098801021" observedRunningTime="2024-07-02 07:56:16.208727345 +0000 UTC m=+45.304606307" watchObservedRunningTime="2024-07-02 07:56:16.209314148 +0000 UTC m=+45.305193110" Jul 2 07:56:16.995000 audit[3490]: AVC avc: denied { write } for pid=3490 comm="tee" name="fd" dev="proc" ino=30217 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:16.995000 audit[3490]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6d1c29fd a2=241 a3=1b6 items=1 ppid=3467 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:16.995000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:56:16.995000 audit: PATH item=0 name="/dev/fd/63" inode=30194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:16.995000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.032000 audit[3524]: AVC avc: denied { write } for pid=3524 comm="tee" name="fd" dev="proc" ino=30242 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.034000 audit[3518]: AVC avc: denied { write } for pid=3518 comm="tee" name="fd" dev="proc" ino=30245 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.037000 audit[3527]: AVC avc: denied { write } for pid=3527 comm="tee" name="fd" dev="proc" ino=30251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.034000 audit[3518]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca5e86a0e a2=241 a3=1b6 items=1 ppid=3465 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.034000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:56:17.034000 audit: PATH item=0 name="/dev/fd/63" inode=30222 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.040000 audit[3529]: AVC avc: denied { write } for pid=3529 comm="tee" name="fd" dev="proc" ino=30255 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.032000 audit[3524]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcadc8ea0c a2=241 a3=1b6 items=1 ppid=3475 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.032000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:56:17.032000 audit: PATH item=0 name="/dev/fd/63" inode=30232 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.032000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.042000 audit[3532]: AVC avc: denied { write } for pid=3532 comm="tee" name="fd" dev="proc" ino=29442 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.037000 audit[3527]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe55101a0d a2=241 a3=1b6 items=1 ppid=3471 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.037000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:56:17.037000 audit: PATH item=0 name="/dev/fd/63" inode=30235 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.037000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.042000 audit[3532]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffec8969fc a2=241 a3=1b6 items=1 ppid=3469 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.042000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:56:17.042000 audit: PATH item=0 name="/dev/fd/63" inode=30239 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.042000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.055000 audit[3534]: AVC avc: denied { write } for pid=3534 comm="tee" name="fd" dev="proc" ino=30260 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:17.055000 audit[3534]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed5025a0c a2=241 a3=1b6 items=1 ppid=3477 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.055000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:56:17.055000 audit: PATH item=0 name="/dev/fd/63" inode=30248 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.040000 audit[3529]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd5762a0c a2=241 a3=1b6 items=1 ppid=3479 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.040000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:56:17.040000 audit: PATH item=0 name="/dev/fd/63" inode=30238 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:17.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.055000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:17.399062 systemd-networkd[1561]: vxlan.calico: Link UP Jul 2 07:56:17.399075 systemd-networkd[1561]: vxlan.calico: Gained carrier Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit: BPF prog-id=140 op=LOAD Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffddbbeae40 a2=70 a3=7f03ff273000 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit: BPF prog-id=141 op=LOAD Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffddbbeae40 a2=70 a3=6f items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit: BPF prog-id=141 op=UNLOAD Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffddbbeadf0 a2=70 a3=7ffddbbeae40 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit: BPF prog-id=142 op=LOAD Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffddbbeadd0 a2=70 a3=7ffddbbeae40 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffddbbeaeb0 a2=70 a3=0 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffddbbeaea0 a2=70 a3=0 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.409000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.409000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffddbbeae10 a2=70 a3=0 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffddbbeaee0 a2=70 a3=1407a00 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.410000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffddbbeaee0 a2=70 a3=1404880 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.410000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.410000 audit: BPF prog-id=143 op=LOAD Jul 2 07:56:17.410000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffddbbeae00 a2=70 a3=0 items=0 ppid=3478 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.410000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:17.418000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.418000 audit[3609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c6931a0 a2=70 a3=fff80800 items=0 ppid=3478 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.418000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:56:17.419000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:17.419000 audit[3609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c693070 a2=70 a3=3 items=0 ppid=3478 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:56:17.425000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:56:17.856000 audit[3633]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=3633 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:17.856000 audit[3633]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe5a221b90 a2=0 a3=7ffe5a221b7c items=0 ppid=3478 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.856000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:17.910000 audit[3635]: NETFILTER_CFG table=raw:104 family=2 entries=19 op=nft_register_chain pid=3635 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:17.910000 audit[3635]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffd4b295e80 a2=0 a3=7ffd4b295e6c items=0 ppid=3478 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:17.931000 audit[3634]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=3634 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:17.931000 audit[3634]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd9a76e8f0 a2=0 a3=7ffd9a76e8dc items=0 ppid=3478 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:17.935000 audit[3637]: NETFILTER_CFG table=filter:106 family=2 entries=39 op=nft_register_chain pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:17.935000 audit[3637]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd5e211130 a2=0 a3=7ffd5e21111c items=0 ppid=3478 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:17.935000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:18.671316 systemd-networkd[1561]: vxlan.calico: Gained IPv6LL Jul 2 07:56:20.022928 env[1407]: time="2024-07-02T07:56:20.020600429Z" level=info msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.067 [INFO][3661] k8s.go 608: Cleaning up netns ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.067 [INFO][3661] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" iface="eth0" netns="/var/run/netns/cni-0f1157df-8859-0cb3-ed0e-79115d2cfd43" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.068 [INFO][3661] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" iface="eth0" netns="/var/run/netns/cni-0f1157df-8859-0cb3-ed0e-79115d2cfd43" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.068 [INFO][3661] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" iface="eth0" netns="/var/run/netns/cni-0f1157df-8859-0cb3-ed0e-79115d2cfd43" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.068 [INFO][3661] k8s.go 615: Releasing IP address(es) ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.068 [INFO][3661] utils.go 188: Calico CNI releasing IP address ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.092 [INFO][3667] ipam_plugin.go 411: Releasing address using handleID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.092 [INFO][3667] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.092 [INFO][3667] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.099 [WARNING][3667] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.099 [INFO][3667] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.101 [INFO][3667] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:20.104428 env[1407]: 2024-07-02 07:56:20.102 [INFO][3661] k8s.go 621: Teardown processing complete. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:20.109588 systemd[1]: run-netns-cni\x2d0f1157df\x2d8859\x2d0cb3\x2ded0e\x2d79115d2cfd43.mount: Deactivated successfully. Jul 2 07:56:20.111468 env[1407]: time="2024-07-02T07:56:20.111423101Z" level=info msg="TearDown network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" successfully" Jul 2 07:56:20.111468 env[1407]: time="2024-07-02T07:56:20.111463301Z" level=info msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" returns successfully" Jul 2 07:56:20.112392 env[1407]: time="2024-07-02T07:56:20.112358705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-wq8n2,Uid:7c3fe036-a1c1-4514-b425-d329b446ee39,Namespace:kube-system,Attempt:1,}" Jul 2 07:56:20.288594 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:20.288721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali632e22826b7: link becomes ready Jul 2 07:56:20.278312 systemd-networkd[1561]: cali632e22826b7: Link UP Jul 2 07:56:20.289738 systemd-networkd[1561]: cali632e22826b7: Gained carrier Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.199 [INFO][3673] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0 coredns-76f75df574- kube-system 7c3fe036-a1c1-4514-b425-d329b446ee39 686 0 2024-07-02 07:55:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 coredns-76f75df574-wq8n2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali632e22826b7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.199 [INFO][3673] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.234 [INFO][3684] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" HandleID="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.244 [INFO][3684] ipam_plugin.go 264: Auto assigning IP ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" HandleID="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efda0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-cc7572d280", "pod":"coredns-76f75df574-wq8n2", "timestamp":"2024-07-02 07:56:20.234914806 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.244 [INFO][3684] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.244 [INFO][3684] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.244 [INFO][3684] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.246 [INFO][3684] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.250 [INFO][3684] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.254 [INFO][3684] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.255 [INFO][3684] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.257 [INFO][3684] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.257 [INFO][3684] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.259 [INFO][3684] ipam.go 1685: Creating new handle: k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256 Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.262 [INFO][3684] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.267 [INFO][3684] ipam.go 1216: Successfully claimed IPs: [192.168.35.1/26] block=192.168.35.0/26 handle="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.267 [INFO][3684] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.1/26] handle="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.267 [INFO][3684] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:20.301888 env[1407]: 2024-07-02 07:56:20.267 [INFO][3684] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.1/26] IPv6=[] ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" HandleID="k8s-pod-network.200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.269 [INFO][3673] k8s.go 386: Populated endpoint ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7c3fe036-a1c1-4514-b425-d329b446ee39", ResourceVersion:"686", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"coredns-76f75df574-wq8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali632e22826b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.269 [INFO][3673] k8s.go 387: Calico CNI using IPs: [192.168.35.1/32] ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.270 [INFO][3673] dataplane_linux.go 68: Setting the host side veth name to cali632e22826b7 ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.289 [INFO][3673] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.289 [INFO][3673] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7c3fe036-a1c1-4514-b425-d329b446ee39", ResourceVersion:"686", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256", Pod:"coredns-76f75df574-wq8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali632e22826b7", MAC:"d6:bf:fa:42:b2:f5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:20.302683 env[1407]: 2024-07-02 07:56:20.298 [INFO][3673] k8s.go 500: Wrote updated endpoint to datastore ContainerID="200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256" Namespace="kube-system" Pod="coredns-76f75df574-wq8n2" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:20.338066 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 07:56:20.338220 kernel: audit: type=1325 audit(1719906980.322:1016): table=filter:107 family=2 entries=34 op=nft_register_chain pid=3711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:20.322000 audit[3711]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:20.338317 env[1407]: time="2024-07-02T07:56:20.323518469Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:20.338317 env[1407]: time="2024-07-02T07:56:20.323606369Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:20.338317 env[1407]: time="2024-07-02T07:56:20.323637869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:20.338317 env[1407]: time="2024-07-02T07:56:20.323786970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256 pid=3710 runtime=io.containerd.runc.v2 Jul 2 07:56:20.322000 audit[3711]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe96142940 a2=0 a3=7ffe9614292c items=0 ppid=3478 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.362165 kernel: audit: type=1300 audit(1719906980.322:1016): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe96142940 a2=0 a3=7ffe9614292c items=0 ppid=3478 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.350834 systemd[1]: Started cri-containerd-200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256.scope. Jul 2 07:56:20.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:20.377130 kernel: audit: type=1327 audit(1719906980.322:1016): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.396290 kernel: audit: type=1400 audit(1719906980.382:1017): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411767 kernel: audit: type=1400 audit(1719906980.382:1018): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.437737 kernel: audit: type=1400 audit(1719906980.382:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.437839 kernel: audit: type=1400 audit(1719906980.382:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.437887 kernel: audit: type=1400 audit(1719906980.382:1021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.451169 kernel: audit: type=1400 audit(1719906980.382:1022): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.477834 kernel: audit: type=1400 audit(1719906980.382:1023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.396000 audit: BPF prog-id=144 op=LOAD Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230306463393333323932386231306137336566323961353231333763 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230306463393333323932386231306137336566323961353231333763 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.397000 audit: BPF prog-id=145 op=LOAD Jul 2 07:56:20.397000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000392f30 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230306463393333323932386231306137336566323961353231333763 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit: BPF prog-id=146 op=LOAD Jul 2 07:56:20.411000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000392f78 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230306463393333323932386231306137336566323961353231333763 Jul 2 07:56:20.411000 audit: BPF prog-id=146 op=UNLOAD Jul 2 07:56:20.411000 audit: BPF prog-id=145 op=UNLOAD Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.411000 audit: BPF prog-id=147 op=LOAD Jul 2 07:56:20.411000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000393388 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230306463393333323932386231306137336566323961353231333763 Jul 2 07:56:20.498205 env[1407]: time="2024-07-02T07:56:20.498160884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-wq8n2,Uid:7c3fe036-a1c1-4514-b425-d329b446ee39,Namespace:kube-system,Attempt:1,} returns sandbox id \"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256\"" Jul 2 07:56:20.502632 env[1407]: time="2024-07-02T07:56:20.502595202Z" level=info msg="CreateContainer within sandbox \"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:56:20.551786 env[1407]: time="2024-07-02T07:56:20.548990192Z" level=info msg="CreateContainer within sandbox \"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"085d8fe1c2df2dadb0247628d6c4be2808ac96f97ecc9dd1010f220e947d5c4b\"" Jul 2 07:56:20.552197 env[1407]: time="2024-07-02T07:56:20.552166805Z" level=info msg="StartContainer for \"085d8fe1c2df2dadb0247628d6c4be2808ac96f97ecc9dd1010f220e947d5c4b\"" Jul 2 07:56:20.569715 systemd[1]: Started cri-containerd-085d8fe1c2df2dadb0247628d6c4be2808ac96f97ecc9dd1010f220e947d5c4b.scope. Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.585000 audit: BPF prog-id=148 op=LOAD Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3710 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356438666531633264663264616462303234373632386436633462 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3710 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356438666531633264663264616462303234373632386436633462 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit: BPF prog-id=149 op=LOAD Jul 2 07:56:20.586000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00033c050 items=0 ppid=3710 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356438666531633264663264616462303234373632386436633462 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit: BPF prog-id=150 op=LOAD Jul 2 07:56:20.586000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00033c098 items=0 ppid=3710 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356438666531633264663264616462303234373632386436633462 Jul 2 07:56:20.586000 audit: BPF prog-id=150 op=UNLOAD Jul 2 07:56:20.586000 audit: BPF prog-id=149 op=UNLOAD Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:20.586000 audit: BPF prog-id=151 op=LOAD Jul 2 07:56:20.586000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00033c4a8 items=0 ppid=3710 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:20.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356438666531633264663264616462303234373632386436633462 Jul 2 07:56:20.607362 env[1407]: time="2024-07-02T07:56:20.607306930Z" level=info msg="StartContainer for \"085d8fe1c2df2dadb0247628d6c4be2808ac96f97ecc9dd1010f220e947d5c4b\" returns successfully" Jul 2 07:56:20.714266 kubelet[2521]: I0702 07:56:20.714224 2521 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:21.024826 env[1407]: time="2024-07-02T07:56:21.024771438Z" level=info msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" Jul 2 07:56:21.028493 env[1407]: time="2024-07-02T07:56:21.028449153Z" level=info msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" Jul 2 07:56:21.029014 env[1407]: time="2024-07-02T07:56:21.028987955Z" level=info msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" Jul 2 07:56:21.294752 kubelet[2521]: I0702 07:56:21.294258 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-wq8n2" podStartSLOduration=37.29419733 podStartE2EDuration="37.29419733s" podCreationTimestamp="2024-07-02 07:55:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:21.270505634 +0000 UTC m=+50.366384596" watchObservedRunningTime="2024-07-02 07:56:21.29419733 +0000 UTC m=+50.390076192" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.211 [INFO][3871] k8s.go 608: Cleaning up netns ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.212 [INFO][3871] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" iface="eth0" netns="/var/run/netns/cni-28299e2d-d41e-0f1e-ff5d-0e4bb5b17f30" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.213 [INFO][3871] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" iface="eth0" netns="/var/run/netns/cni-28299e2d-d41e-0f1e-ff5d-0e4bb5b17f30" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.213 [INFO][3871] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" iface="eth0" netns="/var/run/netns/cni-28299e2d-d41e-0f1e-ff5d-0e4bb5b17f30" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.213 [INFO][3871] k8s.go 615: Releasing IP address(es) ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.213 [INFO][3871] utils.go 188: Calico CNI releasing IP address ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.285 [INFO][3893] ipam_plugin.go 411: Releasing address using handleID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.287 [INFO][3893] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.288 [INFO][3893] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.302 [WARNING][3893] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.302 [INFO][3893] ipam_plugin.go 439: Releasing address using workloadID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.315 [INFO][3893] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:21.319667 env[1407]: 2024-07-02 07:56:21.318 [INFO][3871] k8s.go 621: Teardown processing complete. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:21.328117 systemd[1]: run-netns-cni\x2d28299e2d\x2dd41e\x2d0f1e\x2dff5d\x2d0e4bb5b17f30.mount: Deactivated successfully. Jul 2 07:56:21.329778 env[1407]: time="2024-07-02T07:56:21.329717274Z" level=info msg="TearDown network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" successfully" Jul 2 07:56:21.329938 env[1407]: time="2024-07-02T07:56:21.329915675Z" level=info msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" returns successfully" Jul 2 07:56:21.332419 env[1407]: time="2024-07-02T07:56:21.332381685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qjbnq,Uid:184f582f-9d58-4336-8c14-fe29411b6d43,Namespace:calico-system,Attempt:1,}" Jul 2 07:56:21.350000 audit[3910]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.350000 audit[3910]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd3e306740 a2=0 a3=7ffd3e30672c items=0 ppid=2698 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.354000 audit[3910]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.354000 audit[3910]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd3e306740 a2=0 a3=0 items=0 ppid=2698 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.388000 audit[3913]: NETFILTER_CFG table=filter:110 family=2 entries=11 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.242 [INFO][3880] k8s.go 608: Cleaning up netns ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.242 [INFO][3880] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" iface="eth0" netns="/var/run/netns/cni-cb2e1a13-aadc-7d75-1a53-7b0f665c5092" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.243 [INFO][3880] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" iface="eth0" netns="/var/run/netns/cni-cb2e1a13-aadc-7d75-1a53-7b0f665c5092" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.243 [INFO][3880] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" iface="eth0" netns="/var/run/netns/cni-cb2e1a13-aadc-7d75-1a53-7b0f665c5092" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.243 [INFO][3880] k8s.go 615: Releasing IP address(es) ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.243 [INFO][3880] utils.go 188: Calico CNI releasing IP address ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.354 [INFO][3899] ipam_plugin.go 411: Releasing address using handleID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.354 [INFO][3899] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.354 [INFO][3899] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.368 [WARNING][3899] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.368 [INFO][3899] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.382 [INFO][3899] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:21.396074 env[1407]: 2024-07-02 07:56:21.392 [INFO][3880] k8s.go 621: Teardown processing complete. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:21.401201 systemd[1]: run-netns-cni\x2dcb2e1a13\x2daadc\x2d7d75\x2d1a53\x2d7b0f665c5092.mount: Deactivated successfully. Jul 2 07:56:21.388000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc13e435e0 a2=0 a3=7ffc13e435cc items=0 ppid=2698 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.404366 env[1407]: time="2024-07-02T07:56:21.404206676Z" level=info msg="TearDown network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" successfully" Jul 2 07:56:21.404366 env[1407]: time="2024-07-02T07:56:21.404262876Z" level=info msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" returns successfully" Jul 2 07:56:21.405000 audit[3913]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:21.406786 env[1407]: time="2024-07-02T07:56:21.406752286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-4rb6j,Uid:38ede9b8-38f8-4e84-b230-9f876b10cfc8,Namespace:kube-system,Attempt:1,}" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.241 [INFO][3879] k8s.go 608: Cleaning up netns ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.241 [INFO][3879] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" iface="eth0" netns="/var/run/netns/cni-09177c07-d5d1-6412-200d-91c3ecd82565" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.241 [INFO][3879] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" iface="eth0" netns="/var/run/netns/cni-09177c07-d5d1-6412-200d-91c3ecd82565" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.242 [INFO][3879] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" iface="eth0" netns="/var/run/netns/cni-09177c07-d5d1-6412-200d-91c3ecd82565" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.242 [INFO][3879] k8s.go 615: Releasing IP address(es) ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.242 [INFO][3879] utils.go 188: Calico CNI releasing IP address ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.367 [INFO][3898] ipam_plugin.go 411: Releasing address using handleID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.372 [INFO][3898] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.382 [INFO][3898] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.391 [WARNING][3898] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.391 [INFO][3898] ipam_plugin.go 439: Releasing address using workloadID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.394 [INFO][3898] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:21.407586 env[1407]: 2024-07-02 07:56:21.404 [INFO][3879] k8s.go 621: Teardown processing complete. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:21.405000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc13e435e0 a2=0 a3=7ffc13e435cc items=0 ppid=2698 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:21.408817 env[1407]: time="2024-07-02T07:56:21.407775890Z" level=info msg="TearDown network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" successfully" Jul 2 07:56:21.408817 env[1407]: time="2024-07-02T07:56:21.407806390Z" level=info msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" returns successfully" Jul 2 07:56:21.408940 env[1407]: time="2024-07-02T07:56:21.408909395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687b95697c-fscfd,Uid:d6027e72-ec48-47ef-b741-427622e0fec7,Namespace:calico-system,Attempt:1,}" Jul 2 07:56:21.551323 systemd-networkd[1561]: cali632e22826b7: Gained IPv6LL Jul 2 07:56:21.580982 systemd-networkd[1561]: cali91a6005bd39: Link UP Jul 2 07:56:21.594147 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:21.594249 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali91a6005bd39: link becomes ready Jul 2 07:56:21.594649 systemd-networkd[1561]: cali91a6005bd39: Gained carrier Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.467 [INFO][3916] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0 csi-node-driver- calico-system 184f582f-9d58-4336-8c14-fe29411b6d43 699 0 2024-07-02 07:55:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 csi-node-driver-qjbnq eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali91a6005bd39 [] []}} ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.467 [INFO][3916] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.507 [INFO][3928] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" HandleID="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.525 [INFO][3928] ipam_plugin.go 264: Auto assigning IP ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" HandleID="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000265ed0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-cc7572d280", "pod":"csi-node-driver-qjbnq", "timestamp":"2024-07-02 07:56:21.507623595 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.525 [INFO][3928] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.526 [INFO][3928] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.526 [INFO][3928] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.528 [INFO][3928] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.537 [INFO][3928] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.541 [INFO][3928] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.543 [INFO][3928] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.547 [INFO][3928] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.547 [INFO][3928] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.549 [INFO][3928] ipam.go 1685: Creating new handle: k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.558 [INFO][3928] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.569 [INFO][3928] ipam.go 1216: Successfully claimed IPs: [192.168.35.2/26] block=192.168.35.0/26 handle="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.569 [INFO][3928] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.2/26] handle="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.569 [INFO][3928] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:21.620376 env[1407]: 2024-07-02 07:56:21.569 [INFO][3928] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.2/26] IPv6=[] ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" HandleID="k8s-pod-network.aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.571 [INFO][3916] k8s.go 386: Populated endpoint ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"184f582f-9d58-4336-8c14-fe29411b6d43", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"csi-node-driver-qjbnq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali91a6005bd39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.571 [INFO][3916] k8s.go 387: Calico CNI using IPs: [192.168.35.2/32] ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.571 [INFO][3916] dataplane_linux.go 68: Setting the host side veth name to cali91a6005bd39 ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.595 [INFO][3916] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.595 [INFO][3916] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"184f582f-9d58-4336-8c14-fe29411b6d43", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e", Pod:"csi-node-driver-qjbnq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali91a6005bd39", MAC:"aa:3c:e8:7a:d9:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:21.621378 env[1407]: 2024-07-02 07:56:21.617 [INFO][3916] k8s.go 500: Wrote updated endpoint to datastore ContainerID="aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e" Namespace="calico-system" Pod="csi-node-driver-qjbnq" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:21.657793 env[1407]: time="2024-07-02T07:56:21.657717803Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:21.658058 env[1407]: time="2024-07-02T07:56:21.658014304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:21.658379 env[1407]: time="2024-07-02T07:56:21.658346706Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:21.658730 env[1407]: time="2024-07-02T07:56:21.658662007Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e pid=3979 runtime=io.containerd.runc.v2 Jul 2 07:56:21.703137 systemd[1]: Started cri-containerd-aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e.scope. Jul 2 07:56:21.711000 audit[4008]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=4008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:21.711000 audit[4008]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffbd553780 a2=0 a3=7fffbd55376c items=0 ppid=3478 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.711000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.784000 audit: BPF prog-id=152 op=LOAD Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666436343966306464623838626134633132623964306630376133 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666436343966306464623838626134633132623964306630376133 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit: BPF prog-id=153 op=LOAD Jul 2 07:56:21.786000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000093840 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666436343966306464623838626134633132623964306630376133 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit: BPF prog-id=154 op=LOAD Jul 2 07:56:21.786000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000093888 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666436343966306464623838626134633132623964306630376133 Jul 2 07:56:21.786000 audit: BPF prog-id=154 op=UNLOAD Jul 2 07:56:21.786000 audit: BPF prog-id=153 op=UNLOAD Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.786000 audit: BPF prog-id=155 op=LOAD Jul 2 07:56:21.786000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000093c98 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666436343966306464623838626134633132623964306630376133 Jul 2 07:56:21.858804 systemd-networkd[1561]: calib29fd07b922: Link UP Jul 2 07:56:21.869978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib29fd07b922: link becomes ready Jul 2 07:56:21.870552 systemd-networkd[1561]: calib29fd07b922: Gained carrier Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.666 [INFO][3933] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0 coredns-76f75df574- kube-system 38ede9b8-38f8-4e84-b230-9f876b10cfc8 701 0 2024-07-02 07:55:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 coredns-76f75df574-4rb6j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib29fd07b922 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.666 [INFO][3933] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.752 [INFO][3997] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" HandleID="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.763 [INFO][3997] ipam_plugin.go 264: Auto assigning IP ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" HandleID="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291170), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-cc7572d280", "pod":"coredns-76f75df574-4rb6j", "timestamp":"2024-07-02 07:56:21.752850889 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.764 [INFO][3997] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.764 [INFO][3997] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.764 [INFO][3997] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.766 [INFO][3997] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.773 [INFO][3997] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.801 [INFO][3997] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.811 [INFO][3997] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.820 [INFO][3997] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.820 [INFO][3997] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.830 [INFO][3997] ipam.go 1685: Creating new handle: k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576 Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.835 [INFO][3997] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.850 [INFO][3997] ipam.go 1216: Successfully claimed IPs: [192.168.35.3/26] block=192.168.35.0/26 handle="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.850 [INFO][3997] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.3/26] handle="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.850 [INFO][3997] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:21.895676 env[1407]: 2024-07-02 07:56:21.850 [INFO][3997] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.3/26] IPv6=[] ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" HandleID="k8s-pod-network.5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.852 [INFO][3933] k8s.go 386: Populated endpoint ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"38ede9b8-38f8-4e84-b230-9f876b10cfc8", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"coredns-76f75df574-4rb6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib29fd07b922", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.852 [INFO][3933] k8s.go 387: Calico CNI using IPs: [192.168.35.3/32] ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.852 [INFO][3933] dataplane_linux.go 68: Setting the host side veth name to calib29fd07b922 ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.872 [INFO][3933] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.872 [INFO][3933] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"38ede9b8-38f8-4e84-b230-9f876b10cfc8", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576", Pod:"coredns-76f75df574-4rb6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib29fd07b922", MAC:"ea:56:86:1b:01:f1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:21.896693 env[1407]: 2024-07-02 07:56:21.894 [INFO][3933] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576" Namespace="kube-system" Pod="coredns-76f75df574-4rb6j" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:21.917776 env[1407]: time="2024-07-02T07:56:21.917691957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:21.918017 env[1407]: time="2024-07-02T07:56:21.917988358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:21.918153 env[1407]: time="2024-07-02T07:56:21.918126859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:21.918607 env[1407]: time="2024-07-02T07:56:21.918556160Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576 pid=4042 runtime=io.containerd.runc.v2 Jul 2 07:56:21.936276 systemd[1]: Started cri-containerd-5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576.scope. Jul 2 07:56:21.973709 env[1407]: time="2024-07-02T07:56:21.973660784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qjbnq,Uid:184f582f-9d58-4336-8c14-fe29411b6d43,Namespace:calico-system,Attempt:1,} returns sandbox id \"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e\"" Jul 2 07:56:21.975644 env[1407]: time="2024-07-02T07:56:21.975598692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit: BPF prog-id=156 op=LOAD Jul 2 07:56:21.982000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4042 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353432303166376432383238356634383633376362656432613730 Jul 2 07:56:21.982000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.982000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4042 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353432303166376432383238356634383633376362656432613730 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit: BPF prog-id=157 op=LOAD Jul 2 07:56:21.983000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a2ec0 items=0 ppid=4042 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353432303166376432383238356634383633376362656432613730 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit: BPF prog-id=158 op=LOAD Jul 2 07:56:21.983000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a2f08 items=0 ppid=4042 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353432303166376432383238356634383633376362656432613730 Jul 2 07:56:21.983000 audit: BPF prog-id=158 op=UNLOAD Jul 2 07:56:21.983000 audit: BPF prog-id=157 op=UNLOAD Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:21.983000 audit: BPF prog-id=159 op=LOAD Jul 2 07:56:21.983000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a3318 items=0 ppid=4042 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353432303166376432383238356634383633376362656432613730 Jul 2 07:56:22.002630 systemd-networkd[1561]: calie959442afd6: Link UP Jul 2 07:56:22.011145 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie959442afd6: link becomes ready Jul 2 07:56:22.011329 systemd-networkd[1561]: calie959442afd6: Gained carrier Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.663 [INFO][3942] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0 calico-kube-controllers-687b95697c- calico-system d6027e72-ec48-47ef-b741-427622e0fec7 700 0 2024-07-02 07:55:50 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:687b95697c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 calico-kube-controllers-687b95697c-fscfd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie959442afd6 [] []}} ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.663 [INFO][3942] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.772 [INFO][3996] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" HandleID="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.809 [INFO][3996] ipam_plugin.go 264: Auto assigning IP ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" HandleID="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000117e70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-cc7572d280", "pod":"calico-kube-controllers-687b95697c-fscfd", "timestamp":"2024-07-02 07:56:21.767741349 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.810 [INFO][3996] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.850 [INFO][3996] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.850 [INFO][3996] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.859 [INFO][3996] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.890 [INFO][3996] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.922 [INFO][3996] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.925 [INFO][3996] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.933 [INFO][3996] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.934 [INFO][3996] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.940 [INFO][3996] ipam.go 1685: Creating new handle: k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3 Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.959 [INFO][3996] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.990 [INFO][3996] ipam.go 1216: Successfully claimed IPs: [192.168.35.4/26] block=192.168.35.0/26 handle="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.991 [INFO][3996] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.4/26] handle="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.991 [INFO][3996] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:22.033857 env[1407]: 2024-07-02 07:56:21.991 [INFO][3996] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.4/26] IPv6=[] ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" HandleID="k8s-pod-network.b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:21.998 [INFO][3942] k8s.go 386: Populated endpoint ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0", GenerateName:"calico-kube-controllers-687b95697c-", Namespace:"calico-system", SelfLink:"", UID:"d6027e72-ec48-47ef-b741-427622e0fec7", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687b95697c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"calico-kube-controllers-687b95697c-fscfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie959442afd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:21.998 [INFO][3942] k8s.go 387: Calico CNI using IPs: [192.168.35.4/32] ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:21.998 [INFO][3942] dataplane_linux.go 68: Setting the host side veth name to calie959442afd6 ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:22.015 [INFO][3942] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:22.016 [INFO][3942] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0", GenerateName:"calico-kube-controllers-687b95697c-", Namespace:"calico-system", SelfLink:"", UID:"d6027e72-ec48-47ef-b741-427622e0fec7", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687b95697c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3", Pod:"calico-kube-controllers-687b95697c-fscfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie959442afd6", MAC:"ae:df:4d:a4:53:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:22.035181 env[1407]: 2024-07-02 07:56:22.031 [INFO][3942] k8s.go 500: Wrote updated endpoint to datastore ContainerID="b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3" Namespace="calico-system" Pod="calico-kube-controllers-687b95697c-fscfd" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:22.042000 audit[4083]: NETFILTER_CFG table=filter:113 family=2 entries=34 op=nft_register_chain pid=4083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:22.042000 audit[4083]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffef085d740 a2=0 a3=7ffef085d72c items=0 ppid=3478 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.042000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:22.068680 env[1407]: time="2024-07-02T07:56:22.068624266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-4rb6j,Uid:38ede9b8-38f8-4e84-b230-9f876b10cfc8,Namespace:kube-system,Attempt:1,} returns sandbox id \"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576\"" Jul 2 07:56:22.069647 env[1407]: time="2024-07-02T07:56:22.068958767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:22.069647 env[1407]: time="2024-07-02T07:56:22.069006868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:22.069647 env[1407]: time="2024-07-02T07:56:22.069020468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:22.069647 env[1407]: time="2024-07-02T07:56:22.069341669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3 pid=4106 runtime=io.containerd.runc.v2 Jul 2 07:56:22.088443 env[1407]: time="2024-07-02T07:56:22.088392045Z" level=info msg="CreateContainer within sandbox \"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:56:22.097000 audit[4123]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:22.097000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe20be84f0 a2=0 a3=7ffe20be84dc items=0 ppid=3478 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.097000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:22.127790 systemd[1]: run-netns-cni\x2d09177c07\x2dd5d1\x2d6412\x2d200d\x2d91c3ecd82565.mount: Deactivated successfully. Jul 2 07:56:22.132870 systemd[1]: Started cri-containerd-b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3.scope. Jul 2 07:56:22.158813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2467863140.mount: Deactivated successfully. Jul 2 07:56:22.170657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount973494694.mount: Deactivated successfully. Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.175000 audit: BPF prog-id=160 op=LOAD Jul 2 07:56:22.175000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.175000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4106 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353366383562613832396563316335393338653836373938303739 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4106 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353366383562613832396563316335393338653836373938303739 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit: BPF prog-id=161 op=LOAD Jul 2 07:56:22.176000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032b0d0 items=0 ppid=4106 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353366383562613832396563316335393338653836373938303739 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.176000 audit: BPF prog-id=162 op=LOAD Jul 2 07:56:22.176000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032b118 items=0 ppid=4106 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353366383562613832396563316335393338653836373938303739 Jul 2 07:56:22.178000 audit: BPF prog-id=162 op=UNLOAD Jul 2 07:56:22.178000 audit: BPF prog-id=161 op=UNLOAD Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.178000 audit: BPF prog-id=163 op=LOAD Jul 2 07:56:22.178000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032b528 items=0 ppid=4106 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353366383562613832396563316335393338653836373938303739 Jul 2 07:56:22.188318 env[1407]: time="2024-07-02T07:56:22.188275746Z" level=info msg="CreateContainer within sandbox \"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4fbde8e85b457ebee700feeb258e747025fbb9f9713630b4799ed1d6c8d5bd5c\"" Jul 2 07:56:22.189708 env[1407]: time="2024-07-02T07:56:22.189675252Z" level=info msg="StartContainer for \"4fbde8e85b457ebee700feeb258e747025fbb9f9713630b4799ed1d6c8d5bd5c\"" Jul 2 07:56:22.229732 systemd[1]: Started cri-containerd-4fbde8e85b457ebee700feeb258e747025fbb9f9713630b4799ed1d6c8d5bd5c.scope. Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.251000 audit: BPF prog-id=164 op=LOAD Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4042 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626465386538356234353765626565373030666565623235386537 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4042 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626465386538356234353765626565373030666565623235386537 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.252000 audit: BPF prog-id=165 op=LOAD Jul 2 07:56:22.252000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025130 items=0 ppid=4042 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626465386538356234353765626565373030666565623235386537 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit: BPF prog-id=166 op=LOAD Jul 2 07:56:22.253000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025178 items=0 ppid=4042 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626465386538356234353765626565373030666565623235386537 Jul 2 07:56:22.253000 audit: BPF prog-id=166 op=UNLOAD Jul 2 07:56:22.253000 audit: BPF prog-id=165 op=UNLOAD Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:22.253000 audit: BPF prog-id=167 op=LOAD Jul 2 07:56:22.253000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025588 items=0 ppid=4042 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626465386538356234353765626565373030666565623235386537 Jul 2 07:56:22.278646 env[1407]: time="2024-07-02T07:56:22.278587409Z" level=info msg="StartContainer for \"4fbde8e85b457ebee700feeb258e747025fbb9f9713630b4799ed1d6c8d5bd5c\" returns successfully" Jul 2 07:56:22.290133 env[1407]: time="2024-07-02T07:56:22.290050655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687b95697c-fscfd,Uid:d6027e72-ec48-47ef-b741-427622e0fec7,Namespace:calico-system,Attempt:1,} returns sandbox id \"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3\"" Jul 2 07:56:23.269128 kubelet[2521]: I0702 07:56:23.269071 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-4rb6j" podStartSLOduration=39.269036876 podStartE2EDuration="39.269036876s" podCreationTimestamp="2024-07-02 07:55:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:56:23.268710774 +0000 UTC m=+52.364589736" watchObservedRunningTime="2024-07-02 07:56:23.269036876 +0000 UTC m=+52.364915738" Jul 2 07:56:23.297000 audit[4184]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.297000 audit[4184]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde1ecf680 a2=0 a3=7ffde1ecf66c items=0 ppid=2698 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.304000 audit[4184]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.304000 audit[4184]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde1ecf680 a2=0 a3=7ffde1ecf66c items=0 ppid=2698 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.317000 audit[4186]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.317000 audit[4186]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9f9b1d70 a2=0 a3=7fff9f9b1d5c items=0 ppid=2698 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.326000 audit[4186]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:23.326000 audit[4186]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff9f9b1d70 a2=0 a3=7fff9f9b1d5c items=0 ppid=2698 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:23.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:23.343286 systemd-networkd[1561]: cali91a6005bd39: Gained IPv6LL Jul 2 07:56:23.727323 systemd-networkd[1561]: calib29fd07b922: Gained IPv6LL Jul 2 07:56:23.983325 systemd-networkd[1561]: calie959442afd6: Gained IPv6LL Jul 2 07:56:24.324507 env[1407]: time="2024-07-02T07:56:24.324367862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.330077 env[1407]: time="2024-07-02T07:56:24.330032484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.337708 env[1407]: time="2024-07-02T07:56:24.337670815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.343508 env[1407]: time="2024-07-02T07:56:24.343469437Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.343994 env[1407]: time="2024-07-02T07:56:24.343961039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:56:24.346630 env[1407]: time="2024-07-02T07:56:24.346536649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:56:24.347642 env[1407]: time="2024-07-02T07:56:24.347600654Z" level=info msg="CreateContainer within sandbox \"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:56:24.407159 env[1407]: time="2024-07-02T07:56:24.407087788Z" level=info msg="CreateContainer within sandbox \"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a3016dfde4cb2245c42ba4e30bd0e2eae59defa91ae668e2b4000f197c8d00ee\"" Jul 2 07:56:24.408118 env[1407]: time="2024-07-02T07:56:24.408056592Z" level=info msg="StartContainer for \"a3016dfde4cb2245c42ba4e30bd0e2eae59defa91ae668e2b4000f197c8d00ee\"" Jul 2 07:56:24.449338 systemd[1]: Started cri-containerd-a3016dfde4cb2245c42ba4e30bd0e2eae59defa91ae668e2b4000f197c8d00ee.scope. Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f90c05283e8 items=0 ppid=3979 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133303136646664653463623232343563343262613465333062643065 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit: BPF prog-id=168 op=LOAD Jul 2 07:56:24.463000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000290a98 items=0 ppid=3979 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133303136646664653463623232343563343262613465333062643065 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit: BPF prog-id=169 op=LOAD Jul 2 07:56:24.463000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000290ae8 items=0 ppid=3979 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133303136646664653463623232343563343262613465333062643065 Jul 2 07:56:24.463000 audit: BPF prog-id=169 op=UNLOAD Jul 2 07:56:24.463000 audit: BPF prog-id=168 op=UNLOAD Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:24.463000 audit: BPF prog-id=170 op=LOAD Jul 2 07:56:24.463000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000290b78 items=0 ppid=3979 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133303136646664653463623232343563343262613465333062643065 Jul 2 07:56:24.486684 env[1407]: time="2024-07-02T07:56:24.486632802Z" level=info msg="StartContainer for \"a3016dfde4cb2245c42ba4e30bd0e2eae59defa91ae668e2b4000f197c8d00ee\" returns successfully" Jul 2 07:56:26.497000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:26.502252 kernel: kauditd_printk_skb: 411 callbacks suppressed Jul 2 07:56:26.502345 kernel: audit: type=1400 audit(1719906986.497:1143): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:26.497000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:26.534379 kernel: audit: type=1400 audit(1719906986.497:1142): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:26.534476 kernel: audit: type=1300 audit(1719906986.497:1143): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a0de0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:26.497000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a0de0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:26.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:26.580677 kernel: audit: type=1327 audit(1719906986.497:1143): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:26.580839 kernel: audit: type=1300 audit(1719906986.497:1142): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000977f80 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:26.497000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000977f80 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:26.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:26.620064 kernel: audit: type=1327 audit(1719906986.497:1142): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.274149 kernel: audit: type=1400 audit(1719906987.253:1144): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed29710 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.314136 kernel: audit: type=1300 audit(1719906987.253:1144): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed29710 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.357123 kernel: audit: type=1327 audit(1719906987.253:1144): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.357250 kernel: audit: type=1400 audit(1719906987.253:1145): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed29740 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e7986e0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed298f0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed29950 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.253000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:27.253000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e798860 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:56:27.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:56:27.621349 env[1407]: time="2024-07-02T07:56:27.621295193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:27.632936 env[1407]: time="2024-07-02T07:56:27.632895438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:27.638671 env[1407]: time="2024-07-02T07:56:27.638643260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:27.644266 env[1407]: time="2024-07-02T07:56:27.644225082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:27.644782 env[1407]: time="2024-07-02T07:56:27.644746484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:56:27.646575 env[1407]: time="2024-07-02T07:56:27.646547090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:56:27.666220 env[1407]: time="2024-07-02T07:56:27.666177966Z" level=info msg="CreateContainer within sandbox \"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:56:27.700723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount318934408.mount: Deactivated successfully. Jul 2 07:56:27.713720 env[1407]: time="2024-07-02T07:56:27.713670148Z" level=info msg="CreateContainer within sandbox \"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a\"" Jul 2 07:56:27.715909 env[1407]: time="2024-07-02T07:56:27.714515652Z" level=info msg="StartContainer for \"836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a\"" Jul 2 07:56:27.738593 systemd[1]: Started cri-containerd-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a.scope. Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.755000 audit: BPF prog-id=171 op=LOAD Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4106 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833363539306465623835326263363463653161343739383465643931 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4106 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833363539306465623835326263363463653161343739383465643931 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit: BPF prog-id=172 op=LOAD Jul 2 07:56:27.756000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c4b30 items=0 ppid=4106 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833363539306465623835326263363463653161343739383465643931 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit: BPF prog-id=173 op=LOAD Jul 2 07:56:27.756000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c4b78 items=0 ppid=4106 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833363539306465623835326263363463653161343739383465643931 Jul 2 07:56:27.756000 audit: BPF prog-id=173 op=UNLOAD Jul 2 07:56:27.756000 audit: BPF prog-id=172 op=UNLOAD Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:27.756000 audit: BPF prog-id=174 op=LOAD Jul 2 07:56:27.756000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c4f88 items=0 ppid=4106 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:27.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833363539306465623835326263363463653161343739383465643931 Jul 2 07:56:27.805524 env[1407]: time="2024-07-02T07:56:27.805456601Z" level=info msg="StartContainer for \"836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a\" returns successfully" Jul 2 07:56:28.286653 kubelet[2521]: I0702 07:56:28.286056 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-687b95697c-fscfd" podStartSLOduration=32.932351013 podStartE2EDuration="38.286001238s" podCreationTimestamp="2024-07-02 07:55:50 +0000 UTC" firstStartedPulling="2024-07-02 07:56:22.291644961 +0000 UTC m=+51.387523823" lastFinishedPulling="2024-07-02 07:56:27.645295186 +0000 UTC m=+56.741174048" observedRunningTime="2024-07-02 07:56:28.284234231 +0000 UTC m=+57.380113193" watchObservedRunningTime="2024-07-02 07:56:28.286001238 +0000 UTC m=+57.381880100" Jul 2 07:56:29.302309 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.5vcrFW.mount: Deactivated successfully. Jul 2 07:56:29.740051 env[1407]: time="2024-07-02T07:56:29.739993055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:29.746042 env[1407]: time="2024-07-02T07:56:29.745899077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:29.749973 env[1407]: time="2024-07-02T07:56:29.749934492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:29.753673 env[1407]: time="2024-07-02T07:56:29.753636806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:29.754275 env[1407]: time="2024-07-02T07:56:29.754173008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:56:29.759773 env[1407]: time="2024-07-02T07:56:29.758171423Z" level=info msg="CreateContainer within sandbox \"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:56:29.810372 env[1407]: time="2024-07-02T07:56:29.810319220Z" level=info msg="CreateContainer within sandbox \"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b341e5573ea8b319c94beab553091f80fb8c9f9fcd1df4b9557b654c1fc39886\"" Jul 2 07:56:29.811060 env[1407]: time="2024-07-02T07:56:29.811021023Z" level=info msg="StartContainer for \"b341e5573ea8b319c94beab553091f80fb8c9f9fcd1df4b9557b654c1fc39886\"" Jul 2 07:56:29.848050 systemd[1]: Started cri-containerd-b341e5573ea8b319c94beab553091f80fb8c9f9fcd1df4b9557b654c1fc39886.scope. Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fbb682989b8 items=0 ppid=3979 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233343165353537336561386233313963393462656162353533303931 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit: BPF prog-id=175 op=LOAD Jul 2 07:56:29.868000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001bced8 items=0 ppid=3979 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233343165353537336561386233313963393462656162353533303931 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit: BPF prog-id=176 op=LOAD Jul 2 07:56:29.868000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001bcf28 items=0 ppid=3979 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233343165353537336561386233313963393462656162353533303931 Jul 2 07:56:29.868000 audit: BPF prog-id=176 op=UNLOAD Jul 2 07:56:29.868000 audit: BPF prog-id=175 op=UNLOAD Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:29.868000 audit: BPF prog-id=177 op=LOAD Jul 2 07:56:29.868000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001bcfb8 items=0 ppid=3979 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:29.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233343165353537336561386233313963393462656162353533303931 Jul 2 07:56:29.890626 env[1407]: time="2024-07-02T07:56:29.890567424Z" level=info msg="StartContainer for \"b341e5573ea8b319c94beab553091f80fb8c9f9fcd1df4b9557b654c1fc39886\" returns successfully" Jul 2 07:56:30.141249 kubelet[2521]: I0702 07:56:30.141206 2521 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:56:30.141249 kubelet[2521]: I0702 07:56:30.141254 2521 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:56:30.434332 kubelet[2521]: I0702 07:56:30.434200 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qjbnq" podStartSLOduration=32.654630544 podStartE2EDuration="40.434136865s" podCreationTimestamp="2024-07-02 07:55:50 +0000 UTC" firstStartedPulling="2024-07-02 07:56:21.975065789 +0000 UTC m=+51.070944651" lastFinishedPulling="2024-07-02 07:56:29.75457211 +0000 UTC m=+58.850450972" observedRunningTime="2024-07-02 07:56:30.302836573 +0000 UTC m=+59.398715535" watchObservedRunningTime="2024-07-02 07:56:30.434136865 +0000 UTC m=+59.530015727" Jul 2 07:56:30.434580 kubelet[2521]: I0702 07:56:30.434499 2521 topology_manager.go:215] "Topology Admit Handler" podUID="439e1f84-55bc-415d-9607-c2cba55372cb" podNamespace="calico-apiserver" podName="calico-apiserver-6dc7597d95-kv9bt" Jul 2 07:56:30.441346 systemd[1]: Created slice kubepods-besteffort-pod439e1f84_55bc_415d_9607_c2cba55372cb.slice. Jul 2 07:56:30.447153 kubelet[2521]: W0702 07:56:30.447120 2521 reflector.go:539] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-cc7572d280" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.5-a-cc7572d280' and this object Jul 2 07:56:30.447304 kubelet[2521]: E0702 07:56:30.447168 2521 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.5-a-cc7572d280" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.5-a-cc7572d280' and this object Jul 2 07:56:30.447304 kubelet[2521]: W0702 07:56:30.447238 2521 reflector.go:539] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.5-a-cc7572d280" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.5-a-cc7572d280' and this object Jul 2 07:56:30.447304 kubelet[2521]: E0702 07:56:30.447252 2521 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.5-a-cc7572d280" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.5-a-cc7572d280' and this object Jul 2 07:56:30.467598 kubelet[2521]: I0702 07:56:30.467553 2521 topology_manager.go:215] "Topology Admit Handler" podUID="41fb9485-b898-4886-9664-21ff50efce9e" podNamespace="calico-apiserver" podName="calico-apiserver-6dc7597d95-lr6b8" Jul 2 07:56:30.474142 systemd[1]: Created slice kubepods-besteffort-pod41fb9485_b898_4886_9664_21ff50efce9e.slice. Jul 2 07:56:30.484787 kubelet[2521]: I0702 07:56:30.484753 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/439e1f84-55bc-415d-9607-c2cba55372cb-calico-apiserver-certs\") pod \"calico-apiserver-6dc7597d95-kv9bt\" (UID: \"439e1f84-55bc-415d-9607-c2cba55372cb\") " pod="calico-apiserver/calico-apiserver-6dc7597d95-kv9bt" Jul 2 07:56:30.484969 kubelet[2521]: I0702 07:56:30.484818 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pjbkr\" (UniqueName: \"kubernetes.io/projected/439e1f84-55bc-415d-9607-c2cba55372cb-kube-api-access-pjbkr\") pod \"calico-apiserver-6dc7597d95-kv9bt\" (UID: \"439e1f84-55bc-415d-9607-c2cba55372cb\") " pod="calico-apiserver/calico-apiserver-6dc7597d95-kv9bt" Jul 2 07:56:30.484969 kubelet[2521]: I0702 07:56:30.484852 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kt8vh\" (UniqueName: \"kubernetes.io/projected/41fb9485-b898-4886-9664-21ff50efce9e-kube-api-access-kt8vh\") pod \"calico-apiserver-6dc7597d95-lr6b8\" (UID: \"41fb9485-b898-4886-9664-21ff50efce9e\") " pod="calico-apiserver/calico-apiserver-6dc7597d95-lr6b8" Jul 2 07:56:30.484969 kubelet[2521]: I0702 07:56:30.484883 2521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/41fb9485-b898-4886-9664-21ff50efce9e-calico-apiserver-certs\") pod \"calico-apiserver-6dc7597d95-lr6b8\" (UID: \"41fb9485-b898-4886-9664-21ff50efce9e\") " pod="calico-apiserver/calico-apiserver-6dc7597d95-lr6b8" Jul 2 07:56:30.490000 audit[4326]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.490000 audit[4326]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8c575180 a2=0 a3=7ffd8c57516c items=0 ppid=2698 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.492000 audit[4326]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.492000 audit[4326]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8c575180 a2=0 a3=7ffd8c57516c items=0 ppid=2698 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.507000 audit[4328]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.507000 audit[4328]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff665394e0 a2=0 a3=7fff665394cc items=0 ppid=2698 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:30.509000 audit[4328]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:30.509000 audit[4328]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff665394e0 a2=0 a3=7fff665394cc items=0 ppid=2698 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:30.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:31.022795 env[1407]: time="2024-07-02T07:56:31.022744071Z" level=info msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.084 [WARNING][4345] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7c3fe036-a1c1-4514-b425-d329b446ee39", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256", Pod:"coredns-76f75df574-wq8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali632e22826b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.085 [INFO][4345] k8s.go 608: Cleaning up netns ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.085 [INFO][4345] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" iface="eth0" netns="" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.085 [INFO][4345] k8s.go 615: Releasing IP address(es) ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.085 [INFO][4345] utils.go 188: Calico CNI releasing IP address ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.136 [INFO][4351] ipam_plugin.go 411: Releasing address using handleID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.136 [INFO][4351] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.136 [INFO][4351] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.141 [WARNING][4351] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.141 [INFO][4351] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.142 [INFO][4351] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.144636 env[1407]: 2024-07-02 07:56:31.143 [INFO][4345] k8s.go 621: Teardown processing complete. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.145311 env[1407]: time="2024-07-02T07:56:31.144658425Z" level=info msg="TearDown network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" successfully" Jul 2 07:56:31.145311 env[1407]: time="2024-07-02T07:56:31.144691625Z" level=info msg="StopPodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" returns successfully" Jul 2 07:56:31.145582 env[1407]: time="2024-07-02T07:56:31.145556228Z" level=info msg="RemovePodSandbox for \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" Jul 2 07:56:31.145710 env[1407]: time="2024-07-02T07:56:31.145679129Z" level=info msg="Forcibly stopping sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\"" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.180 [WARNING][4369] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7c3fe036-a1c1-4514-b425-d329b446ee39", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"200dc9332928b10a73ef29a52137c6701ceda66e810bbf5dc1aaed5e10f84256", Pod:"coredns-76f75df574-wq8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali632e22826b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.181 [INFO][4369] k8s.go 608: Cleaning up netns ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.181 [INFO][4369] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" iface="eth0" netns="" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.181 [INFO][4369] k8s.go 615: Releasing IP address(es) ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.181 [INFO][4369] utils.go 188: Calico CNI releasing IP address ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.201 [INFO][4375] ipam_plugin.go 411: Releasing address using handleID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.202 [INFO][4375] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.202 [INFO][4375] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.207 [WARNING][4375] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.207 [INFO][4375] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" HandleID="k8s-pod-network.9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--wq8n2-eth0" Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.208 [INFO][4375] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.210799 env[1407]: 2024-07-02 07:56:31.209 [INFO][4369] k8s.go 621: Teardown processing complete. ContainerID="9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465" Jul 2 07:56:31.211429 env[1407]: time="2024-07-02T07:56:31.211383873Z" level=info msg="TearDown network for sandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" successfully" Jul 2 07:56:31.246827 env[1407]: time="2024-07-02T07:56:31.246771205Z" level=info msg="RemovePodSandbox \"9cb65dde302374b41add508e858c8ca6d209a03afa004870183bec2faead4465\" returns successfully" Jul 2 07:56:31.248538 env[1407]: time="2024-07-02T07:56:31.248487311Z" level=info msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.301 [WARNING][4397] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"38ede9b8-38f8-4e84-b230-9f876b10cfc8", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576", Pod:"coredns-76f75df574-4rb6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib29fd07b922", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.301 [INFO][4397] k8s.go 608: Cleaning up netns ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.301 [INFO][4397] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" iface="eth0" netns="" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.301 [INFO][4397] k8s.go 615: Releasing IP address(es) ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.301 [INFO][4397] utils.go 188: Calico CNI releasing IP address ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.322 [INFO][4405] ipam_plugin.go 411: Releasing address using handleID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.322 [INFO][4405] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.322 [INFO][4405] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.328 [WARNING][4405] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.328 [INFO][4405] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.329 [INFO][4405] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.334165 env[1407]: 2024-07-02 07:56:31.332 [INFO][4397] k8s.go 621: Teardown processing complete. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.335704 env[1407]: time="2024-07-02T07:56:31.334132530Z" level=info msg="TearDown network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" successfully" Jul 2 07:56:31.335810 env[1407]: time="2024-07-02T07:56:31.335706436Z" level=info msg="StopPodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" returns successfully" Jul 2 07:56:31.338688 env[1407]: time="2024-07-02T07:56:31.336308338Z" level=info msg="RemovePodSandbox for \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" Jul 2 07:56:31.338688 env[1407]: time="2024-07-02T07:56:31.336351538Z" level=info msg="Forcibly stopping sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\"" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.371 [WARNING][4425] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"38ede9b8-38f8-4e84-b230-9f876b10cfc8", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"5f54201f7d28285f48637cbed2a708cba087fa2192349945b934c278222ed576", Pod:"coredns-76f75df574-4rb6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib29fd07b922", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.372 [INFO][4425] k8s.go 608: Cleaning up netns ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.372 [INFO][4425] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" iface="eth0" netns="" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.372 [INFO][4425] k8s.go 615: Releasing IP address(es) ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.372 [INFO][4425] utils.go 188: Calico CNI releasing IP address ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.396 [INFO][4431] ipam_plugin.go 411: Releasing address using handleID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.396 [INFO][4431] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.396 [INFO][4431] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.401 [WARNING][4431] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.401 [INFO][4431] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" HandleID="k8s-pod-network.8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Workload="ci--3510.3.5--a--cc7572d280-k8s-coredns--76f75df574--4rb6j-eth0" Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.402 [INFO][4431] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.405015 env[1407]: 2024-07-02 07:56:31.403 [INFO][4425] k8s.go 621: Teardown processing complete. ContainerID="8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8" Jul 2 07:56:31.405771 env[1407]: time="2024-07-02T07:56:31.405052094Z" level=info msg="TearDown network for sandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" successfully" Jul 2 07:56:31.414137 env[1407]: time="2024-07-02T07:56:31.414086528Z" level=info msg="RemovePodSandbox \"8ee84523ccf4f8f95ee4ccf27bf81c39dd87e6e187e7c2ffaec47bf1480facb8\" returns successfully" Jul 2 07:56:31.414702 env[1407]: time="2024-07-02T07:56:31.414670430Z" level=info msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.454 [WARNING][4449] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"184f582f-9d58-4336-8c14-fe29411b6d43", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e", Pod:"csi-node-driver-qjbnq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali91a6005bd39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.454 [INFO][4449] k8s.go 608: Cleaning up netns ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.455 [INFO][4449] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" iface="eth0" netns="" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.455 [INFO][4449] k8s.go 615: Releasing IP address(es) ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.455 [INFO][4449] utils.go 188: Calico CNI releasing IP address ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.477 [INFO][4455] ipam_plugin.go 411: Releasing address using handleID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.477 [INFO][4455] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.477 [INFO][4455] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.487 [WARNING][4455] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.488 [INFO][4455] ipam_plugin.go 439: Releasing address using workloadID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.489 [INFO][4455] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.491440 env[1407]: 2024-07-02 07:56:31.490 [INFO][4449] k8s.go 621: Teardown processing complete. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.492207 env[1407]: time="2024-07-02T07:56:31.492156118Z" level=info msg="TearDown network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" successfully" Jul 2 07:56:31.492396 env[1407]: time="2024-07-02T07:56:31.492203118Z" level=info msg="StopPodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" returns successfully" Jul 2 07:56:31.492761 env[1407]: time="2024-07-02T07:56:31.492731620Z" level=info msg="RemovePodSandbox for \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" Jul 2 07:56:31.492881 env[1407]: time="2024-07-02T07:56:31.492768120Z" level=info msg="Forcibly stopping sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\"" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.527 [WARNING][4474] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"184f582f-9d58-4336-8c14-fe29411b6d43", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"aafd649f0ddb88ba4c12b9d0f07a3fbd40a8a117f16fa8d0afc36a23bab2c78e", Pod:"csi-node-driver-qjbnq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali91a6005bd39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.528 [INFO][4474] k8s.go 608: Cleaning up netns ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.528 [INFO][4474] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" iface="eth0" netns="" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.528 [INFO][4474] k8s.go 615: Releasing IP address(es) ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.528 [INFO][4474] utils.go 188: Calico CNI releasing IP address ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.553 [INFO][4480] ipam_plugin.go 411: Releasing address using handleID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.554 [INFO][4480] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.554 [INFO][4480] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.559 [WARNING][4480] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.559 [INFO][4480] ipam_plugin.go 439: Releasing address using workloadID ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" HandleID="k8s-pod-network.91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Workload="ci--3510.3.5--a--cc7572d280-k8s-csi--node--driver--qjbnq-eth0" Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.560 [INFO][4480] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.562234 env[1407]: 2024-07-02 07:56:31.561 [INFO][4474] k8s.go 621: Teardown processing complete. ContainerID="91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627" Jul 2 07:56:31.562850 env[1407]: time="2024-07-02T07:56:31.562816381Z" level=info msg="TearDown network for sandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" successfully" Jul 2 07:56:31.571077 env[1407]: time="2024-07-02T07:56:31.571033512Z" level=info msg="RemovePodSandbox \"91537e8fe931d41359af2ecf821aabdb00bbeee6cc83d2ff10a4b60ad6050627\" returns successfully" Jul 2 07:56:31.571628 env[1407]: time="2024-07-02T07:56:31.571597714Z" level=info msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" Jul 2 07:56:31.590045 kubelet[2521]: E0702 07:56:31.586680 2521 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:31.590045 kubelet[2521]: E0702 07:56:31.586804 2521 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/41fb9485-b898-4886-9664-21ff50efce9e-calico-apiserver-certs podName:41fb9485-b898-4886-9664-21ff50efce9e nodeName:}" failed. No retries permitted until 2024-07-02 07:56:32.08677727 +0000 UTC m=+61.182656132 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/41fb9485-b898-4886-9664-21ff50efce9e-calico-apiserver-certs") pod "calico-apiserver-6dc7597d95-lr6b8" (UID: "41fb9485-b898-4886-9664-21ff50efce9e") : failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:31.590045 kubelet[2521]: E0702 07:56:31.586680 2521 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:31.590045 kubelet[2521]: E0702 07:56:31.586861 2521 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/439e1f84-55bc-415d-9607-c2cba55372cb-calico-apiserver-certs podName:439e1f84-55bc-415d-9607-c2cba55372cb nodeName:}" failed. No retries permitted until 2024-07-02 07:56:32.08684527 +0000 UTC m=+61.182724132 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/439e1f84-55bc-415d-9607-c2cba55372cb-calico-apiserver-certs") pod "calico-apiserver-6dc7597d95-kv9bt" (UID: "439e1f84-55bc-415d-9607-c2cba55372cb") : failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:31.592020 kubelet[2521]: E0702 07:56:31.591772 2521 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.592020 kubelet[2521]: E0702 07:56:31.591808 2521 projected.go:200] Error preparing data for projected volume kube-api-access-kt8vh for pod calico-apiserver/calico-apiserver-6dc7597d95-lr6b8: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.592020 kubelet[2521]: E0702 07:56:31.591863 2521 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/41fb9485-b898-4886-9664-21ff50efce9e-kube-api-access-kt8vh podName:41fb9485-b898-4886-9664-21ff50efce9e nodeName:}" failed. No retries permitted until 2024-07-02 07:56:32.091845989 +0000 UTC m=+61.187724851 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-kt8vh" (UniqueName: "kubernetes.io/projected/41fb9485-b898-4886-9664-21ff50efce9e-kube-api-access-kt8vh") pod "calico-apiserver-6dc7597d95-lr6b8" (UID: "41fb9485-b898-4886-9664-21ff50efce9e") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.595808 kubelet[2521]: E0702 07:56:31.595705 2521 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.595808 kubelet[2521]: E0702 07:56:31.595732 2521 projected.go:200] Error preparing data for projected volume kube-api-access-pjbkr for pod calico-apiserver/calico-apiserver-6dc7597d95-kv9bt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.595808 kubelet[2521]: E0702 07:56:31.595787 2521 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/439e1f84-55bc-415d-9607-c2cba55372cb-kube-api-access-pjbkr podName:439e1f84-55bc-415d-9607-c2cba55372cb nodeName:}" failed. No retries permitted until 2024-07-02 07:56:32.095768804 +0000 UTC m=+61.191647666 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-pjbkr" (UniqueName: "kubernetes.io/projected/439e1f84-55bc-415d-9607-c2cba55372cb-kube-api-access-pjbkr") pod "calico-apiserver-6dc7597d95-kv9bt" (UID: "439e1f84-55bc-415d-9607-c2cba55372cb") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.610 [WARNING][4500] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0", GenerateName:"calico-kube-controllers-687b95697c-", Namespace:"calico-system", SelfLink:"", UID:"d6027e72-ec48-47ef-b741-427622e0fec7", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687b95697c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3", Pod:"calico-kube-controllers-687b95697c-fscfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie959442afd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.610 [INFO][4500] k8s.go 608: Cleaning up netns ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.610 [INFO][4500] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" iface="eth0" netns="" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.610 [INFO][4500] k8s.go 615: Releasing IP address(es) ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.610 [INFO][4500] utils.go 188: Calico CNI releasing IP address ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.631 [INFO][4506] ipam_plugin.go 411: Releasing address using handleID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.631 [INFO][4506] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.631 [INFO][4506] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.639 [WARNING][4506] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.639 [INFO][4506] ipam_plugin.go 439: Releasing address using workloadID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.641 [INFO][4506] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.646504 env[1407]: 2024-07-02 07:56:31.645 [INFO][4500] k8s.go 621: Teardown processing complete. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.647299 env[1407]: time="2024-07-02T07:56:31.646537393Z" level=info msg="TearDown network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" successfully" Jul 2 07:56:31.647299 env[1407]: time="2024-07-02T07:56:31.646578593Z" level=info msg="StopPodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" returns successfully" Jul 2 07:56:31.647910 env[1407]: time="2024-07-02T07:56:31.647872797Z" level=info msg="RemovePodSandbox for \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" Jul 2 07:56:31.648286 env[1407]: time="2024-07-02T07:56:31.648232499Z" level=info msg="Forcibly stopping sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\"" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.689 [WARNING][4524] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0", GenerateName:"calico-kube-controllers-687b95697c-", Namespace:"calico-system", SelfLink:"", UID:"d6027e72-ec48-47ef-b741-427622e0fec7", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687b95697c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"b153f85ba829ec1c5938e867980792c34e4e3fa519896a2ca05f14ef38cfa8e3", Pod:"calico-kube-controllers-687b95697c-fscfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie959442afd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.689 [INFO][4524] k8s.go 608: Cleaning up netns ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.689 [INFO][4524] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" iface="eth0" netns="" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.689 [INFO][4524] k8s.go 615: Releasing IP address(es) ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.689 [INFO][4524] utils.go 188: Calico CNI releasing IP address ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.711 [INFO][4530] ipam_plugin.go 411: Releasing address using handleID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.711 [INFO][4530] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.711 [INFO][4530] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.719 [WARNING][4530] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.719 [INFO][4530] ipam_plugin.go 439: Releasing address using workloadID ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" HandleID="k8s-pod-network.07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--kube--controllers--687b95697c--fscfd-eth0" Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.721 [INFO][4530] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:31.723348 env[1407]: 2024-07-02 07:56:31.722 [INFO][4524] k8s.go 621: Teardown processing complete. ContainerID="07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4" Jul 2 07:56:31.723942 env[1407]: time="2024-07-02T07:56:31.723899280Z" level=info msg="TearDown network for sandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" successfully" Jul 2 07:56:31.733126 env[1407]: time="2024-07-02T07:56:31.732220611Z" level=info msg="RemovePodSandbox \"07554bb0f29da1c3430338177f360e855150fb405cb932e8a73027bbdbfd8ef4\" returns successfully" Jul 2 07:56:32.248666 env[1407]: time="2024-07-02T07:56:32.248621426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc7597d95-kv9bt,Uid:439e1f84-55bc-415d-9607-c2cba55372cb,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:56:32.295001 env[1407]: time="2024-07-02T07:56:32.289087875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc7597d95-lr6b8,Uid:41fb9485-b898-4886-9664-21ff50efce9e,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:56:32.470808 systemd-networkd[1561]: calie912e14136a: Link UP Jul 2 07:56:32.473409 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:32.480809 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie912e14136a: link becomes ready Jul 2 07:56:32.481540 systemd-networkd[1561]: calie912e14136a: Gained carrier Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.370 [INFO][4542] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0 calico-apiserver-6dc7597d95- calico-apiserver 439e1f84-55bc-415d-9607-c2cba55372cb 819 0 2024-07-02 07:56:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dc7597d95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 calico-apiserver-6dc7597d95-kv9bt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie912e14136a [] []}} ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.370 [INFO][4542] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.418 [INFO][4562] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" HandleID="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.431 [INFO][4562] ipam_plugin.go 264: Auto assigning IP ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" HandleID="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000293320), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-cc7572d280", "pod":"calico-apiserver-6dc7597d95-kv9bt", "timestamp":"2024-07-02 07:56:32.418220352 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.431 [INFO][4562] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.431 [INFO][4562] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.431 [INFO][4562] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.433 [INFO][4562] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.442 [INFO][4562] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.446 [INFO][4562] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.447 [INFO][4562] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.450 [INFO][4562] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.450 [INFO][4562] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.451 [INFO][4562] ipam.go 1685: Creating new handle: k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337 Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.456 [INFO][4562] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.465 [INFO][4562] ipam.go 1216: Successfully claimed IPs: [192.168.35.5/26] block=192.168.35.0/26 handle="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.465 [INFO][4562] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.5/26] handle="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.465 [INFO][4562] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:32.513622 env[1407]: 2024-07-02 07:56:32.465 [INFO][4562] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.5/26] IPv6=[] ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" HandleID="k8s-pod-network.e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.466 [INFO][4542] k8s.go 386: Populated endpoint ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0", GenerateName:"calico-apiserver-6dc7597d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"439e1f84-55bc-415d-9607-c2cba55372cb", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc7597d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"calico-apiserver-6dc7597d95-kv9bt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie912e14136a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.466 [INFO][4542] k8s.go 387: Calico CNI using IPs: [192.168.35.5/32] ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.466 [INFO][4542] dataplane_linux.go 68: Setting the host side veth name to calie912e14136a ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.484 [INFO][4542] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.496 [INFO][4542] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0", GenerateName:"calico-apiserver-6dc7597d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"439e1f84-55bc-415d-9607-c2cba55372cb", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc7597d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337", Pod:"calico-apiserver-6dc7597d95-kv9bt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie912e14136a", MAC:"ba:6e:52:24:17:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.514948 env[1407]: 2024-07-02 07:56:32.507 [INFO][4542] k8s.go 500: Wrote updated endpoint to datastore ContainerID="e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-kv9bt" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--kv9bt-eth0" Jul 2 07:56:32.552133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidc81136ab41: link becomes ready Jul 2 07:56:32.558556 kernel: kauditd_printk_skb: 126 callbacks suppressed Jul 2 07:56:32.558696 kernel: audit: type=1325 audit(1719906992.542:1178): table=filter:123 family=2 entries=61 op=nft_register_chain pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:32.542000 audit[4591]: NETFILTER_CFG table=filter:123 family=2 entries=61 op=nft_register_chain pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:32.557077 systemd-networkd[1561]: calidc81136ab41: Link UP Jul 2 07:56:32.560022 systemd-networkd[1561]: calidc81136ab41: Gained carrier Jul 2 07:56:32.542000 audit[4591]: SYSCALL arch=c000003e syscall=46 success=yes exit=30316 a0=3 a1=7ffd3e877530 a2=0 a3=7ffd3e87751c items=0 ppid=3478 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.411 [INFO][4552] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0 calico-apiserver-6dc7597d95- calico-apiserver 41fb9485-b898-4886-9664-21ff50efce9e 823 0 2024-07-02 07:56:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dc7597d95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-cc7572d280 calico-apiserver-6dc7597d95-lr6b8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidc81136ab41 [] []}} ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.411 [INFO][4552] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.454 [INFO][4570] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" HandleID="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.493 [INFO][4570] ipam_plugin.go 264: Auto assigning IP ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" HandleID="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7dc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-cc7572d280", "pod":"calico-apiserver-6dc7597d95-lr6b8", "timestamp":"2024-07-02 07:56:32.454624387 +0000 UTC"}, Hostname:"ci-3510.3.5-a-cc7572d280", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.493 [INFO][4570] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.493 [INFO][4570] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.494 [INFO][4570] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-cc7572d280' Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.498 [INFO][4570] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.501 [INFO][4570] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.516 [INFO][4570] ipam.go 489: Trying affinity for 192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.518 [INFO][4570] ipam.go 155: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.521 [INFO][4570] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.521 [INFO][4570] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.524 [INFO][4570] ipam.go 1685: Creating new handle: k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130 Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.529 [INFO][4570] ipam.go 1203: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.538 [INFO][4570] ipam.go 1216: Successfully claimed IPs: [192.168.35.6/26] block=192.168.35.0/26 handle="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.538 [INFO][4570] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.6/26] handle="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" host="ci-3510.3.5-a-cc7572d280" Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.538 [INFO][4570] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:32.590824 env[1407]: 2024-07-02 07:56:32.538 [INFO][4570] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.35.6/26] IPv6=[] ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" HandleID="k8s-pod-network.54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Workload="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.544 [INFO][4552] k8s.go 386: Populated endpoint ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0", GenerateName:"calico-apiserver-6dc7597d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"41fb9485-b898-4886-9664-21ff50efce9e", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc7597d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"", Pod:"calico-apiserver-6dc7597d95-lr6b8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidc81136ab41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.544 [INFO][4552] k8s.go 387: Calico CNI using IPs: [192.168.35.6/32] ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.544 [INFO][4552] dataplane_linux.go 68: Setting the host side veth name to calidc81136ab41 ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.551 [INFO][4552] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.562 [INFO][4552] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0", GenerateName:"calico-apiserver-6dc7597d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"41fb9485-b898-4886-9664-21ff50efce9e", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc7597d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-cc7572d280", ContainerID:"54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130", Pod:"calico-apiserver-6dc7597d95-lr6b8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidc81136ab41", MAC:"76:4f:14:16:bb:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.591801 env[1407]: 2024-07-02 07:56:32.573 [INFO][4552] k8s.go 500: Wrote updated endpoint to datastore ContainerID="54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130" Namespace="calico-apiserver" Pod="calico-apiserver-6dc7597d95-lr6b8" WorkloadEndpoint="ci--3510.3.5--a--cc7572d280-k8s-calico--apiserver--6dc7597d95--lr6b8-eth0" Jul 2 07:56:32.592778 env[1407]: time="2024-07-02T07:56:32.592721897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:32.592934 env[1407]: time="2024-07-02T07:56:32.592910097Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:32.593064 env[1407]: time="2024-07-02T07:56:32.593036998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:32.593368 env[1407]: time="2024-07-02T07:56:32.593335799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337 pid=4598 runtime=io.containerd.runc.v2 Jul 2 07:56:32.596195 kernel: audit: type=1300 audit(1719906992.542:1178): arch=c000003e syscall=46 success=yes exit=30316 a0=3 a1=7ffd3e877530 a2=0 a3=7ffd3e87751c items=0 ppid=3478 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.596281 kernel: audit: type=1327 audit(1719906992.542:1178): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:32.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:32.637075 systemd[1]: Started cri-containerd-e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337.scope. Jul 2 07:56:32.667497 env[1407]: time="2024-07-02T07:56:32.667405273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:32.667755 env[1407]: time="2024-07-02T07:56:32.667720474Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:32.667938 env[1407]: time="2024-07-02T07:56:32.667911774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:32.668285 env[1407]: time="2024-07-02T07:56:32.668206576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130 pid=4635 runtime=io.containerd.runc.v2 Jul 2 07:56:32.674000 audit[4624]: NETFILTER_CFG table=filter:124 family=2 entries=45 op=nft_register_chain pid=4624 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:32.709576 kernel: audit: type=1325 audit(1719906992.674:1179): table=filter:124 family=2 entries=45 op=nft_register_chain pid=4624 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:32.709732 kernel: audit: type=1300 audit(1719906992.674:1179): arch=c000003e syscall=46 success=yes exit=23096 a0=3 a1=7ffc2f1b41e0 a2=0 a3=7ffc2f1b41cc items=0 ppid=3478 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.674000 audit[4624]: SYSCALL arch=c000003e syscall=46 success=yes exit=23096 a0=3 a1=7ffc2f1b41e0 a2=0 a3=7ffc2f1b41cc items=0 ppid=3478 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.690115 systemd[1]: Started cri-containerd-54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130.scope. Jul 2 07:56:32.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.736064 kernel: audit: type=1327 audit(1719906992.674:1179): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:32.736177 kernel: audit: type=1400 audit(1719906992.715:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751295 kernel: audit: type=1400 audit(1719906992.715:1181): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.765330 kernel: audit: type=1400 audit(1719906992.715:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.781529 kernel: audit: type=1400 audit(1719906992.715:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.749000 audit: BPF prog-id=178 op=LOAD Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4598 pid=4610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323162626632376431646637663632326437343532383931643031 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4598 pid=4610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323162626632376431646637663632326437343532383931643031 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.751000 audit: BPF prog-id=179 op=LOAD Jul 2 07:56:32.751000 audit[4610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a5110 items=0 ppid=4598 pid=4610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323162626632376431646637663632326437343532383931643031 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit: BPF prog-id=180 op=LOAD Jul 2 07:56:32.763000 audit[4610]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a5158 items=0 ppid=4598 pid=4610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323162626632376431646637663632326437343532383931643031 Jul 2 07:56:32.763000 audit: BPF prog-id=180 op=UNLOAD Jul 2 07:56:32.763000 audit: BPF prog-id=179 op=UNLOAD Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { perfmon } for pid=4610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit[4610]: AVC avc: denied { bpf } for pid=4610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.763000 audit: BPF prog-id=181 op=LOAD Jul 2 07:56:32.763000 audit[4610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a5568 items=0 ppid=4598 pid=4610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323162626632376431646637663632326437343532383931643031 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.794000 audit: BPF prog-id=182 op=LOAD Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4635 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323733323631653961633032303634376237333865386238633032 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4635 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323733323631653961633032303634376237333865386238633032 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit: BPF prog-id=183 op=LOAD Jul 2 07:56:32.795000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b6c0 items=0 ppid=4635 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323733323631653961633032303634376237333865386238633032 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.795000 audit: BPF prog-id=184 op=LOAD Jul 2 07:56:32.795000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b708 items=0 ppid=4635 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323733323631653961633032303634376237333865386238633032 Jul 2 07:56:32.796000 audit: BPF prog-id=184 op=UNLOAD Jul 2 07:56:32.796000 audit: BPF prog-id=183 op=UNLOAD Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:32.796000 audit: BPF prog-id=185 op=LOAD Jul 2 07:56:32.796000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021bb18 items=0 ppid=4635 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323733323631653961633032303634376237333865386238633032 Jul 2 07:56:32.817998 env[1407]: time="2024-07-02T07:56:32.817791128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc7597d95-kv9bt,Uid:439e1f84-55bc-415d-9607-c2cba55372cb,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337\"" Jul 2 07:56:32.821883 env[1407]: time="2024-07-02T07:56:32.821847543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:56:32.840356 env[1407]: time="2024-07-02T07:56:32.840318911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc7597d95-lr6b8,Uid:41fb9485-b898-4886-9664-21ff50efce9e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130\"" Jul 2 07:56:33.647248 systemd-networkd[1561]: calie912e14136a: Gained IPv6LL Jul 2 07:56:34.351416 systemd-networkd[1561]: calidc81136ab41: Gained IPv6LL Jul 2 07:56:35.314987 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.yyoStI.mount: Deactivated successfully. Jul 2 07:56:36.381471 env[1407]: time="2024-07-02T07:56:36.381416292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.391441 env[1407]: time="2024-07-02T07:56:36.391392628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.395844 env[1407]: time="2024-07-02T07:56:36.395807043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.400013 env[1407]: time="2024-07-02T07:56:36.399979858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.400560 env[1407]: time="2024-07-02T07:56:36.400524460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:56:36.402162 env[1407]: time="2024-07-02T07:56:36.402132266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:56:36.403394 env[1407]: time="2024-07-02T07:56:36.403359771Z" level=info msg="CreateContainer within sandbox \"e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:56:36.448994 env[1407]: time="2024-07-02T07:56:36.448940634Z" level=info msg="CreateContainer within sandbox \"e321bbf27d1df7f622d7452891d01eaa719abc57fbe26edf7e9cc11e57f31337\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8b8f184b52ce9947c9c89ee41e81f60247eb188feea18e449ab3871030864a0f\"" Jul 2 07:56:36.451447 env[1407]: time="2024-07-02T07:56:36.449943338Z" level=info msg="StartContainer for \"8b8f184b52ce9947c9c89ee41e81f60247eb188feea18e449ab3871030864a0f\"" Jul 2 07:56:36.473377 systemd[1]: Started cri-containerd-8b8f184b52ce9947c9c89ee41e81f60247eb188feea18e449ab3871030864a0f.scope. Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.490000 audit: BPF prog-id=186 op=LOAD Jul 2 07:56:36.491000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.491000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4598 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386631383462353263653939343763396338396565343165383166 Jul 2 07:56:36.491000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.491000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4598 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386631383462353263653939343763396338396565343165383166 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit: BPF prog-id=187 op=LOAD Jul 2 07:56:36.492000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00027ce90 items=0 ppid=4598 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386631383462353263653939343763396338396565343165383166 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit: BPF prog-id=188 op=LOAD Jul 2 07:56:36.492000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00027ced8 items=0 ppid=4598 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386631383462353263653939343763396338396565343165383166 Jul 2 07:56:36.492000 audit: BPF prog-id=188 op=UNLOAD Jul 2 07:56:36.492000 audit: BPF prog-id=187 op=UNLOAD Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.492000 audit: BPF prog-id=189 op=LOAD Jul 2 07:56:36.492000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00027d2e8 items=0 ppid=4598 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386631383462353263653939343763396338396565343165383166 Jul 2 07:56:36.526282 env[1407]: time="2024-07-02T07:56:36.526198912Z" level=info msg="StartContainer for \"8b8f184b52ce9947c9c89ee41e81f60247eb188feea18e449ab3871030864a0f\" returns successfully" Jul 2 07:56:36.874562 env[1407]: time="2024-07-02T07:56:36.874513862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.883131 env[1407]: time="2024-07-02T07:56:36.883080693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.889767 env[1407]: time="2024-07-02T07:56:36.889721417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.896116 env[1407]: time="2024-07-02T07:56:36.896066540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:36.896877 env[1407]: time="2024-07-02T07:56:36.896839642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:56:36.900645 env[1407]: time="2024-07-02T07:56:36.900611356Z" level=info msg="CreateContainer within sandbox \"54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:56:36.941757 env[1407]: time="2024-07-02T07:56:36.941703804Z" level=info msg="CreateContainer within sandbox \"54273261e9ac020647b738e8b8c02190a08ce5162a570f391c1947691c2f4130\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a6356009f3c2406e3ebd7249d65501d4a5b63f98901e341108fd561e334619d8\"" Jul 2 07:56:36.942792 env[1407]: time="2024-07-02T07:56:36.942759307Z" level=info msg="StartContainer for \"a6356009f3c2406e3ebd7249d65501d4a5b63f98901e341108fd561e334619d8\"" Jul 2 07:56:36.973241 systemd[1]: Started cri-containerd-a6356009f3c2406e3ebd7249d65501d4a5b63f98901e341108fd561e334619d8.scope. Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.989000 audit: BPF prog-id=190 op=LOAD Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4635 pid=4752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333536303039663363323430366533656264373234396436353530 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4635 pid=4752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333536303039663363323430366533656264373234396436353530 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit: BPF prog-id=191 op=LOAD Jul 2 07:56:36.990000 audit[4752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000289ba0 items=0 ppid=4635 pid=4752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333536303039663363323430366533656264373234396436353530 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit: BPF prog-id=192 op=LOAD Jul 2 07:56:36.990000 audit[4752]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000289be8 items=0 ppid=4635 pid=4752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333536303039663363323430366533656264373234396436353530 Jul 2 07:56:36.990000 audit: BPF prog-id=192 op=UNLOAD Jul 2 07:56:36.990000 audit: BPF prog-id=191 op=UNLOAD Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { perfmon } for pid=4752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit[4752]: AVC avc: denied { bpf } for pid=4752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:36.990000 audit: BPF prog-id=193 op=LOAD Jul 2 07:56:36.990000 audit[4752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000289ff8 items=0 ppid=4635 pid=4752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:36.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333536303039663363323430366533656264373234396436353530 Jul 2 07:56:37.043028 env[1407]: time="2024-07-02T07:56:37.042958766Z" level=info msg="StartContainer for \"a6356009f3c2406e3ebd7249d65501d4a5b63f98901e341108fd561e334619d8\" returns successfully" Jul 2 07:56:37.155000 audit[4725]: AVC avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:56:37.155000 audit[4725]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000909100 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:56:37.155000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:56:37.354047 kubelet[2521]: I0702 07:56:37.354013 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dc7597d95-lr6b8" podStartSLOduration=3.297608544 podStartE2EDuration="7.353953975s" podCreationTimestamp="2024-07-02 07:56:30 +0000 UTC" firstStartedPulling="2024-07-02 07:56:32.841480415 +0000 UTC m=+61.937359377" lastFinishedPulling="2024-07-02 07:56:36.897825946 +0000 UTC m=+65.993704808" observedRunningTime="2024-07-02 07:56:37.351859068 +0000 UTC m=+66.447737930" watchObservedRunningTime="2024-07-02 07:56:37.353953975 +0000 UTC m=+66.449832837" Jul 2 07:56:37.369262 kubelet[2521]: I0702 07:56:37.369222 2521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dc7597d95-kv9bt" podStartSLOduration=3.7875578020000003 podStartE2EDuration="7.36915383s" podCreationTimestamp="2024-07-02 07:56:30 +0000 UTC" firstStartedPulling="2024-07-02 07:56:32.819383334 +0000 UTC m=+61.915262196" lastFinishedPulling="2024-07-02 07:56:36.400979262 +0000 UTC m=+65.496858224" observedRunningTime="2024-07-02 07:56:37.367706524 +0000 UTC m=+66.463585386" watchObservedRunningTime="2024-07-02 07:56:37.36915383 +0000 UTC m=+66.465032692" Jul 2 07:56:37.391000 audit[4784]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.391000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffee0e8af20 a2=0 a3=7ffee0e8af0c items=0 ppid=2698 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.393000 audit[4784]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.393000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffee0e8af20 a2=0 a3=7ffee0e8af0c items=0 ppid=2698 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.437000 audit[4786]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.437000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffbed55a30 a2=0 a3=7fffbed55a1c items=0 ppid=2698 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.439000 audit[4786]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_register_chain pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:37.439000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffbed55a30 a2=0 a3=7fffbed55a1c items=0 ppid=2698 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:37.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:37.704000 audit[4764]: AVC avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:56:37.710786 kernel: kauditd_printk_skb: 239 callbacks suppressed Jul 2 07:56:37.710882 kernel: audit: type=1400 audit(1719906997.704:1257): avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:56:37.704000 audit[4764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c054a0 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:56:37.751191 kernel: audit: type=1300 audit(1719906997.704:1257): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c054a0 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:56:37.704000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:56:37.769126 kernel: audit: type=1327 audit(1719906997.704:1257): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:56:38.458000 audit[4798]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:38.458000 audit[4798]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6b72edd0 a2=0 a3=7fff6b72edbc items=0 ppid=2698 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.495555 kernel: audit: type=1325 audit(1719906998.458:1258): table=filter:129 family=2 entries=8 op=nft_register_rule pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:38.495738 kernel: audit: type=1300 audit(1719906998.458:1258): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6b72edd0 a2=0 a3=7fff6b72edbc items=0 ppid=2698 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:38.462000 audit[4798]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:38.520510 kernel: audit: type=1327 audit(1719906998.458:1258): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:38.520623 kernel: audit: type=1325 audit(1719906998.462:1259): table=nat:130 family=2 entries=34 op=nft_register_chain pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:38.462000 audit[4798]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff6b72edd0 a2=0 a3=7fff6b72edbc items=0 ppid=2698 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:38.550628 kernel: audit: type=1300 audit(1719906998.462:1259): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff6b72edd0 a2=0 a3=7fff6b72edbc items=0 ppid=2698 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:38.550710 kernel: audit: type=1327 audit(1719906998.462:1259): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:42.967000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:42.967000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:43.000702 kernel: audit: type=1400 audit(1719907002.967:1260): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:43.000809 kernel: audit: type=1400 audit(1719907002.967:1261): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:43.000835 kernel: audit: type=1300 audit(1719907002.967:1261): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6460 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6460 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:43.042140 kernel: audit: type=1327 audit(1719907002.967:1261): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:42.967000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:42.967000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6a60 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:43.080287 kernel: audit: type=1400 audit(1719907002.967:1262): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:43.080428 kernel: audit: type=1300 audit(1719907002.967:1262): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6a60 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:43.098447 kernel: audit: type=1327 audit(1719907002.967:1262): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:43.098556 kernel: audit: type=1400 audit(1719907002.967:1263): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:42.967000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:43.115289 kernel: audit: type=1300 audit(1719907002.967:1263): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6c00 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a6c00 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:43.138136 kernel: audit: type=1327 audit(1719907002.967:1263): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:42.967000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a716a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:56:42.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:50.744137 systemd[1]: run-containerd-runc-k8s.io-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811-runc.hnNa0m.mount: Deactivated successfully. Jul 2 07:56:53.361582 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.7GUBGn.mount: Deactivated successfully. Jul 2 07:57:05.311657 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.FFWjZ5.mount: Deactivated successfully. Jul 2 07:57:20.737884 systemd[1]: run-containerd-runc-k8s.io-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811-runc.nh8xmI.mount: Deactivated successfully. Jul 2 07:57:26.497000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:26.504720 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 07:57:26.504883 kernel: audit: type=1400 audit(1719907046.497:1264): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:26.498000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:26.537538 kernel: audit: type=1400 audit(1719907046.498:1265): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:26.537669 kernel: audit: type=1300 audit(1719907046.498:1265): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00173e860 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:26.498000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00173e860 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:26.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:26.577116 kernel: audit: type=1327 audit(1719907046.498:1265): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:26.577222 kernel: audit: type=1300 audit(1719907046.497:1264): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c101e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:26.497000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c101e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:26.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:26.617386 kernel: audit: type=1327 audit(1719907046.497:1264): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:27.254000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.254000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.291187 kernel: audit: type=1400 audit(1719907047.254:1266): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.291321 kernel: audit: type=1400 audit(1719907047.254:1267): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.291351 kernel: audit: type=1300 audit(1719907047.254:1266): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ec96c00 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.254000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ec96c00 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.328182 kernel: audit: type=1327 audit(1719907047.254:1266): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00bfc83c0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00bfc83f0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ec96c60 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00bfc84b0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:27.254000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a161da0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:57:27.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:35.340337 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.VL6cVR.mount: Deactivated successfully. Jul 2 07:57:36.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.16.10:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:36.095892 systemd[1]: Started sshd@7-10.200.8.38:22-10.200.16.10:59288.service. Jul 2 07:57:36.101323 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 07:57:36.101408 kernel: audit: type=1130 audit(1719907056.095:1272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.16.10:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:36.750254 sshd[4953]: Accepted publickey for core from 10.200.16.10 port 59288 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:36.749000 audit[4953]: USER_ACCT pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.764472 sshd[4953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:36.774306 kernel: audit: type=1101 audit(1719907056.749:1273): pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.774371 kernel: audit: type=1103 audit(1719907056.760:1274): pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.760000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.783738 systemd[1]: Started session-10.scope. Jul 2 07:57:36.785089 systemd-logind[1395]: New session 10 of user core. Jul 2 07:57:36.802601 kernel: audit: type=1006 audit(1719907056.760:1275): pid=4953 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 07:57:36.803226 kernel: audit: type=1300 audit(1719907056.760:1275): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe272a21d0 a2=3 a3=0 items=0 ppid=1 pid=4953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:36.760000 audit[4953]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe272a21d0 a2=3 a3=0 items=0 ppid=1 pid=4953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:36.760000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:36.822711 kernel: audit: type=1327 audit(1719907056.760:1275): proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:36.791000 audit[4953]: USER_START pid=4953 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.826300 kernel: audit: type=1105 audit(1719907056.791:1276): pid=4953 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.791000 audit[4955]: CRED_ACQ pid=4955 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:36.860341 kernel: audit: type=1103 audit(1719907056.791:1277): pid=4955 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:37.158000 audit[4725]: AVC avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:57:37.181132 kernel: audit: type=1400 audit(1719907057.158:1278): avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:57:37.158000 audit[4725]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000791cc0 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:57:37.207121 kernel: audit: type=1300 audit(1719907057.158:1278): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000791cc0 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:57:37.158000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:57:37.330462 sshd[4953]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:37.331000 audit[4953]: USER_END pid=4953 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:37.331000 audit[4953]: CRED_DISP pid=4953 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:37.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.16.10:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.334467 systemd-logind[1395]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:57:37.334693 systemd[1]: sshd@7-10.200.8.38:22-10.200.16.10:59288.service: Deactivated successfully. Jul 2 07:57:37.335612 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:57:37.336725 systemd-logind[1395]: Removed session 10. Jul 2 07:57:37.713000 audit[4764]: AVC avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:57:37.713000 audit[4764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b83d80 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:57:37.713000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:57:42.439250 systemd[1]: Started sshd@8-10.200.8.38:22-10.200.16.10:35978.service. Jul 2 07:57:42.449456 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:57:42.449545 kernel: audit: type=1130 audit(1719907062.438:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.16.10:35978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:42.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.16.10:35978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:42.967000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:42.969000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.002070 kernel: audit: type=1400 audit(1719907062.967:1284): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.002190 kernel: audit: type=1400 audit(1719907062.969:1285): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.002215 kernel: audit: type=1300 audit(1719907062.969:1285): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cc20 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:42.969000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cc20 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:42.969000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:43.043296 kernel: audit: type=1327 audit(1719907062.969:1285): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:42.970000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.060034 kernel: audit: type=1400 audit(1719907062.970:1286): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.060180 kernel: audit: type=1300 audit(1719907062.970:1286): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cdc0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:42.970000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cdc0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:42.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:43.104108 kernel: audit: type=1327 audit(1719907062.970:1286): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:43.104243 kernel: audit: type=1400 audit(1719907062.970:1287): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:42.970000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:43.113869 sshd[4977]: Accepted publickey for core from 10.200.16.10 port 35978 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:42.970000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cf60 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:43.122653 sshd[4977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:43.128283 systemd[1]: Started session-11.scope. Jul 2 07:57:43.129549 systemd-logind[1395]: New session 11 of user core. Jul 2 07:57:42.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:42.967000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00252e1e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:42.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:43.112000 audit[4977]: USER_ACCT pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.120000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.120000 audit[4977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d9f4800 a2=3 a3=0 items=0 ppid=1 pid=4977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:43.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:43.133000 audit[4977]: USER_START pid=4977 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.135000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.143133 kernel: audit: type=1300 audit(1719907062.970:1287): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266cf60 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:57:43.625298 sshd[4977]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:43.625000 audit[4977]: USER_END pid=4977 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.625000 audit[4977]: CRED_DISP pid=4977 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:43.628953 systemd[1]: sshd@8-10.200.8.38:22-10.200.16.10:35978.service: Deactivated successfully. Jul 2 07:57:43.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.16.10:35978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:43.629962 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:57:43.630972 systemd-logind[1395]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:57:43.631809 systemd-logind[1395]: Removed session 11. Jul 2 07:57:48.759412 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:57:48.759575 kernel: audit: type=1130 audit(1719907068.735:1296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.16.10:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.16.10:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.736556 systemd[1]: Started sshd@9-10.200.8.38:22-10.200.16.10:55306.service. Jul 2 07:57:49.392000 audit[4991]: USER_ACCT pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.412219 kernel: audit: type=1101 audit(1719907069.392:1297): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.395025 sshd[4991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:49.412544 sshd[4991]: Accepted publickey for core from 10.200.16.10 port 55306 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:49.392000 audit[4991]: CRED_ACQ pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.420418 systemd[1]: Started session-12.scope. Jul 2 07:57:49.421607 systemd-logind[1395]: New session 12 of user core. Jul 2 07:57:49.433121 kernel: audit: type=1103 audit(1719907069.392:1298): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.433200 kernel: audit: type=1006 audit(1719907069.392:1299): pid=4991 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 07:57:49.442487 kernel: audit: type=1300 audit(1719907069.392:1299): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccbdf6de0 a2=3 a3=0 items=0 ppid=1 pid=4991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:49.392000 audit[4991]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccbdf6de0 a2=3 a3=0 items=0 ppid=1 pid=4991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:49.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:49.460116 kernel: audit: type=1327 audit(1719907069.392:1299): proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:49.423000 audit[4991]: USER_START pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.484441 kernel: audit: type=1105 audit(1719907069.423:1300): pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.428000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.485133 kernel: audit: type=1103 audit(1719907069.428:1301): pid=4993 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.919514 sshd[4991]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:49.920000 audit[4991]: USER_END pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.922788 systemd[1]: sshd@9-10.200.8.38:22-10.200.16.10:55306.service: Deactivated successfully. Jul 2 07:57:49.923637 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:57:49.925384 systemd-logind[1395]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:57:49.926305 systemd-logind[1395]: Removed session 12. Jul 2 07:57:49.946121 kernel: audit: type=1106 audit(1719907069.920:1302): pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.946232 kernel: audit: type=1104 audit(1719907069.920:1303): pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.920000 audit[4991]: CRED_DISP pid=4991 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:49.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.16.10:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.738710 systemd[1]: run-containerd-runc-k8s.io-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811-runc.1A0EVQ.mount: Deactivated successfully. Jul 2 07:57:51.200708 update_engine[1396]: I0702 07:57:51.200663 1396 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 07:57:51.200708 update_engine[1396]: I0702 07:57:51.200699 1396 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 07:57:51.201386 update_engine[1396]: I0702 07:57:51.200865 1396 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 07:57:51.201505 update_engine[1396]: I0702 07:57:51.201481 1396 omaha_request_params.cc:62] Current group set to lts Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201689 1396 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201702 1396 update_attempter.cc:643] Scheduling an action processor start. Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201722 1396 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201758 1396 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201828 1396 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201834 1396 omaha_request_action.cc:271] Request: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: Jul 2 07:57:51.201957 update_engine[1396]: I0702 07:57:51.201840 1396 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:57:51.202434 locksmithd[1487]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 07:57:51.273330 update_engine[1396]: I0702 07:57:51.273281 1396 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:57:51.273609 update_engine[1396]: I0702 07:57:51.273556 1396 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:57:51.303356 update_engine[1396]: E0702 07:57:51.303311 1396 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:57:51.303502 update_engine[1396]: I0702 07:57:51.303449 1396 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 07:57:55.040209 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:57:55.040351 kernel: audit: type=1130 audit(1719907075.029:1305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.16.10:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:55.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.16.10:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:55.029596 systemd[1]: Started sshd@10-10.200.8.38:22-10.200.16.10:55316.service. Jul 2 07:57:55.676000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.696373 kernel: audit: type=1101 audit(1719907075.676:1306): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.678441 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:55.696749 sshd[5051]: Accepted publickey for core from 10.200.16.10 port 55316 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:55.677000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.703831 systemd[1]: Started session-13.scope. Jul 2 07:57:55.704937 systemd-logind[1395]: New session 13 of user core. Jul 2 07:57:55.716116 kernel: audit: type=1103 audit(1719907075.677:1307): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.716185 kernel: audit: type=1006 audit(1719907075.677:1308): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 07:57:55.677000 audit[5051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d238570 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.744207 kernel: audit: type=1300 audit(1719907075.677:1308): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d238570 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:55.750693 kernel: audit: type=1327 audit(1719907075.677:1308): proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:55.750771 kernel: audit: type=1105 audit(1719907075.716:1309): pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.716000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.720000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:55.770130 kernel: audit: type=1103 audit(1719907075.720:1310): pid=5065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.197373 sshd[5051]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:56.199000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.201028 systemd-logind[1395]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:57:56.202508 systemd[1]: sshd@10-10.200.8.38:22-10.200.16.10:55316.service: Deactivated successfully. Jul 2 07:57:56.203327 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:57:56.204782 systemd-logind[1395]: Removed session 13. Jul 2 07:57:56.218119 kernel: audit: type=1106 audit(1719907076.199:1311): pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.199000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.16.10:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:56.234205 kernel: audit: type=1104 audit(1719907076.199:1312): pid=5051 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.38:22-10.200.16.10:55328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:56.307823 systemd[1]: Started sshd@11-10.200.8.38:22-10.200.16.10:55328.service. Jul 2 07:57:56.962000 audit[5076]: USER_ACCT pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.963027 sshd[5076]: Accepted publickey for core from 10.200.16.10 port 55328 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:56.964000 audit[5076]: CRED_ACQ pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.964000 audit[5076]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0f364df0 a2=3 a3=0 items=0 ppid=1 pid=5076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:56.964773 sshd[5076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:56.970038 systemd-logind[1395]: New session 14 of user core. Jul 2 07:57:56.970277 systemd[1]: Started session-14.scope. Jul 2 07:57:56.975000 audit[5076]: USER_START pid=5076 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:56.977000 audit[5078]: CRED_ACQ pid=5078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:57.519402 sshd[5076]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:57.521000 audit[5076]: USER_END pid=5076 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:57.521000 audit[5076]: CRED_DISP pid=5076 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:57.523519 systemd[1]: sshd@11-10.200.8.38:22-10.200.16.10:55328.service: Deactivated successfully. Jul 2 07:57:57.524798 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:57:57.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.38:22-10.200.16.10:55328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.525960 systemd-logind[1395]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:57:57.527004 systemd-logind[1395]: Removed session 14. Jul 2 07:57:57.629969 systemd[1]: Started sshd@12-10.200.8.38:22-10.200.16.10:55344.service. Jul 2 07:57:57.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.38:22-10.200.16.10:55344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.303000 audit[5085]: USER_ACCT pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.303956 sshd[5085]: Accepted publickey for core from 10.200.16.10 port 55344 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:58.305000 audit[5085]: CRED_ACQ pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.305000 audit[5085]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c811b50 a2=3 a3=0 items=0 ppid=1 pid=5085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:58.305813 sshd[5085]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:58.311996 systemd[1]: Started session-15.scope. Jul 2 07:57:58.312692 systemd-logind[1395]: New session 15 of user core. Jul 2 07:57:58.317000 audit[5085]: USER_START pid=5085 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.318000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.833905 sshd[5085]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:58.835000 audit[5085]: USER_END pid=5085 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.835000 audit[5085]: CRED_DISP pid=5085 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:58.837682 systemd[1]: sshd@12-10.200.8.38:22-10.200.16.10:55344.service: Deactivated successfully. Jul 2 07:57:58.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.38:22-10.200.16.10:55344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.838918 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:57:58.839889 systemd-logind[1395]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:57:58.841028 systemd-logind[1395]: Removed session 15. Jul 2 07:58:01.199819 update_engine[1396]: I0702 07:58:01.199766 1396 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:01.200397 update_engine[1396]: I0702 07:58:01.200146 1396 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:01.200473 update_engine[1396]: I0702 07:58:01.200423 1396 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:01.215576 update_engine[1396]: E0702 07:58:01.215541 1396 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:01.215769 update_engine[1396]: I0702 07:58:01.215675 1396 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 07:58:03.954969 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:58:03.955128 kernel: audit: type=1130 audit(1719907083.943:1332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.16.10:49200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:03.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.16.10:49200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:03.944599 systemd[1]: Started sshd@13-10.200.8.38:22-10.200.16.10:49200.service. Jul 2 07:58:04.595000 audit[5103]: USER_ACCT pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.598657 sshd[5103]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:04.616387 kernel: audit: type=1101 audit(1719907084.595:1333): pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.616439 sshd[5103]: Accepted publickey for core from 10.200.16.10 port 49200 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:04.597000 audit[5103]: CRED_ACQ pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.624171 systemd[1]: Started session-16.scope. Jul 2 07:58:04.625505 systemd-logind[1395]: New session 16 of user core. Jul 2 07:58:04.645741 kernel: audit: type=1103 audit(1719907084.597:1334): pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.645831 kernel: audit: type=1006 audit(1719907084.597:1335): pid=5103 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:58:04.645858 kernel: audit: type=1300 audit(1719907084.597:1335): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7caab0b0 a2=3 a3=0 items=0 ppid=1 pid=5103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:04.597000 audit[5103]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7caab0b0 a2=3 a3=0 items=0 ppid=1 pid=5103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:04.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:04.669043 kernel: audit: type=1327 audit(1719907084.597:1335): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:04.669320 kernel: audit: type=1105 audit(1719907084.626:1336): pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.626000 audit[5103]: USER_START pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.631000 audit[5105]: CRED_ACQ pid=5105 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:04.703404 kernel: audit: type=1103 audit(1719907084.631:1337): pid=5105 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:05.117357 sshd[5103]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:05.117000 audit[5103]: USER_END pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:05.121051 systemd[1]: sshd@13-10.200.8.38:22-10.200.16.10:49200.service: Deactivated successfully. Jul 2 07:58:05.121913 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:58:05.123032 systemd-logind[1395]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:58:05.123853 systemd-logind[1395]: Removed session 16. Jul 2 07:58:05.117000 audit[5103]: CRED_DISP pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:05.153127 kernel: audit: type=1106 audit(1719907085.117:1338): pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:05.153239 kernel: audit: type=1104 audit(1719907085.117:1339): pid=5103 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:05.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.16.10:49200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.310950 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.j7RizE.mount: Deactivated successfully. Jul 2 07:58:10.228524 systemd[1]: Started sshd@14-10.200.8.38:22-10.200.16.10:46482.service. Jul 2 07:58:10.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.16.10:46482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:10.234353 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:10.234436 kernel: audit: type=1130 audit(1719907090.228:1341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.16.10:46482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:10.911000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:10.914494 sshd[5135]: Accepted publickey for core from 10.200.16.10 port 46482 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:10.931123 kernel: audit: type=1101 audit(1719907090.911:1342): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:10.930000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:10.931947 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:10.938232 systemd[1]: Started session-17.scope. Jul 2 07:58:10.939275 systemd-logind[1395]: New session 17 of user core. Jul 2 07:58:10.951059 kernel: audit: type=1103 audit(1719907090.930:1343): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:10.951165 kernel: audit: type=1006 audit(1719907090.930:1344): pid=5135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 07:58:10.930000 audit[5135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff42ec0900 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.979065 kernel: audit: type=1300 audit(1719907090.930:1344): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff42ec0900 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.981670 kernel: audit: type=1327 audit(1719907090.930:1344): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:10.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:10.943000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.005362 kernel: audit: type=1105 audit(1719907090.943:1345): pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:10.952000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.024747 kernel: audit: type=1103 audit(1719907090.952:1346): pid=5137 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.200850 update_engine[1396]: I0702 07:58:11.200214 1396 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:11.200850 update_engine[1396]: I0702 07:58:11.200505 1396 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:11.200850 update_engine[1396]: I0702 07:58:11.200722 1396 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:11.225804 update_engine[1396]: E0702 07:58:11.225757 1396 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:11.226000 update_engine[1396]: I0702 07:58:11.225899 1396 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 07:58:11.446164 sshd[5135]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:11.446000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.449095 systemd[1]: sshd@14-10.200.8.38:22-10.200.16.10:46482.service: Deactivated successfully. Jul 2 07:58:11.450967 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:58:11.451880 systemd-logind[1395]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:58:11.452869 systemd-logind[1395]: Removed session 17. Jul 2 07:58:11.467226 kernel: audit: type=1106 audit(1719907091.446:1347): pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.467312 kernel: audit: type=1104 audit(1719907091.446:1348): pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.446000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:11.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.16.10:46482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.556915 systemd[1]: Started sshd@15-10.200.8.38:22-10.200.16.10:46492.service. Jul 2 07:58:16.581439 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:16.581581 kernel: audit: type=1130 audit(1719907096.556:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.16.10:46492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.16.10:46492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.211555 sshd[5158]: Accepted publickey for core from 10.200.16.10 port 46492 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:17.210000 audit[5158]: USER_ACCT pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.230000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.231347 sshd[5158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:17.247245 systemd[1]: Started session-18.scope. Jul 2 07:58:17.248078 systemd-logind[1395]: New session 18 of user core. Jul 2 07:58:17.262720 kernel: audit: type=1101 audit(1719907097.210:1351): pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.262835 kernel: audit: type=1103 audit(1719907097.230:1352): pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.276280 kernel: audit: type=1006 audit(1719907097.230:1353): pid=5158 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 07:58:17.230000 audit[5158]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb013e7c0 a2=3 a3=0 items=0 ppid=1 pid=5158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:17.299270 kernel: audit: type=1300 audit(1719907097.230:1353): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb013e7c0 a2=3 a3=0 items=0 ppid=1 pid=5158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.299364 kernel: audit: type=1327 audit(1719907097.230:1353): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:17.299387 kernel: audit: type=1105 audit(1719907097.250:1354): pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.250000 audit[5158]: USER_START pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.332847 kernel: audit: type=1103 audit(1719907097.262:1355): pid=5160 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.262000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.737248 sshd[5158]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:17.738000 audit[5158]: USER_END pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.741270 systemd[1]: sshd@15-10.200.8.38:22-10.200.16.10:46492.service: Deactivated successfully. Jul 2 07:58:17.742267 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:58:17.743928 systemd-logind[1395]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:58:17.745061 systemd-logind[1395]: Removed session 18. Jul 2 07:58:17.738000 audit[5158]: CRED_DISP pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.773306 kernel: audit: type=1106 audit(1719907097.738:1356): pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.773431 kernel: audit: type=1104 audit(1719907097.738:1357): pid=5158 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:17.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.16.10:46492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:20.744238 systemd[1]: run-containerd-runc-k8s.io-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811-runc.2SbTls.mount: Deactivated successfully. Jul 2 07:58:21.203282 update_engine[1396]: I0702 07:58:21.203186 1396 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:21.203878 update_engine[1396]: I0702 07:58:21.203574 1396 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:21.203963 update_engine[1396]: I0702 07:58:21.203877 1396 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:21.330311 update_engine[1396]: E0702 07:58:21.330264 1396 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:21.330543 update_engine[1396]: I0702 07:58:21.330408 1396 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:58:21.330543 update_engine[1396]: I0702 07:58:21.330421 1396 omaha_request_action.cc:621] Omaha request response: Jul 2 07:58:21.330543 update_engine[1396]: E0702 07:58:21.330514 1396 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 2 07:58:21.330543 update_engine[1396]: I0702 07:58:21.330533 1396 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 07:58:21.330543 update_engine[1396]: I0702 07:58:21.330538 1396 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:21.330543 update_engine[1396]: I0702 07:58:21.330541 1396 update_attempter.cc:306] Processing Done. Jul 2 07:58:21.330856 update_engine[1396]: E0702 07:58:21.330559 1396 update_attempter.cc:619] Update failed. Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330564 1396 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330569 1396 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330574 1396 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330672 1396 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330698 1396 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330703 1396 omaha_request_action.cc:271] Request: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: Jul 2 07:58:21.330856 update_engine[1396]: I0702 07:58:21.330709 1396 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:58:21.331399 update_engine[1396]: I0702 07:58:21.330926 1396 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:58:21.331399 update_engine[1396]: I0702 07:58:21.331180 1396 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 07:58:21.331588 locksmithd[1487]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 07:58:21.334838 update_engine[1396]: E0702 07:58:21.334807 1396 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334909 1396 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334920 1396 omaha_request_action.cc:621] Omaha request response: Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334926 1396 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334930 1396 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334933 1396 update_attempter.cc:306] Processing Done. Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334939 1396 update_attempter.cc:310] Error event sent. Jul 2 07:58:21.334955 update_engine[1396]: I0702 07:58:21.334949 1396 update_check_scheduler.cc:74] Next update check in 45m50s Jul 2 07:58:21.335334 locksmithd[1487]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 07:58:22.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.38:22-10.200.16.10:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:22.897590 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:22.897797 kernel: audit: type=1130 audit(1719907102.847:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.38:22-10.200.16.10:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:22.847944 systemd[1]: Started sshd@16-10.200.8.38:22-10.200.16.10:44678.service. Jul 2 07:58:23.503000 audit[5192]: USER_ACCT pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.504528 sshd[5192]: Accepted publickey for core from 10.200.16.10 port 44678 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:23.526000 audit[5192]: CRED_ACQ pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.528746 sshd[5192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:23.534365 systemd[1]: Started session-19.scope. Jul 2 07:58:23.535512 systemd-logind[1395]: New session 19 of user core. Jul 2 07:58:23.545321 kernel: audit: type=1101 audit(1719907103.503:1360): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.545412 kernel: audit: type=1103 audit(1719907103.526:1361): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.549125 kernel: audit: type=1006 audit(1719907103.527:1362): pid=5192 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 2 07:58:23.527000 audit[5192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1abf44c0 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.556126 kernel: audit: type=1300 audit(1719907103.527:1362): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1abf44c0 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.527000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:23.578460 kernel: audit: type=1327 audit(1719907103.527:1362): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:23.539000 audit[5192]: USER_START pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.597283 kernel: audit: type=1105 audit(1719907103.539:1363): pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.597368 kernel: audit: type=1103 audit(1719907103.542:1364): pid=5194 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:23.542000 audit[5194]: CRED_ACQ pid=5194 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.035965 sshd[5192]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:24.036000 audit[5192]: USER_END pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.039195 systemd[1]: sshd@16-10.200.8.38:22-10.200.16.10:44678.service: Deactivated successfully. Jul 2 07:58:24.040058 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:58:24.041743 systemd-logind[1395]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:58:24.042724 systemd-logind[1395]: Removed session 19. Jul 2 07:58:24.057345 kernel: audit: type=1106 audit(1719907104.036:1365): pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.057427 kernel: audit: type=1104 audit(1719907104.036:1366): pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.036000 audit[5192]: CRED_DISP pid=5192 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.38:22-10.200.16.10:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.147025 systemd[1]: Started sshd@17-10.200.8.38:22-10.200.16.10:44682.service. Jul 2 07:58:24.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.38:22-10.200.16.10:44682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.801000 audit[5204]: USER_ACCT pid=5204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.803217 sshd[5204]: Accepted publickey for core from 10.200.16.10 port 44682 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:24.803000 audit[5204]: CRED_ACQ pid=5204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.804690 sshd[5204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:24.803000 audit[5204]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd526d27c0 a2=3 a3=0 items=0 ppid=1 pid=5204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.803000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:24.809944 systemd-logind[1395]: New session 20 of user core. Jul 2 07:58:24.810479 systemd[1]: Started session-20.scope. Jul 2 07:58:24.814000 audit[5204]: USER_START pid=5204 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:24.815000 audit[5211]: CRED_ACQ pid=5211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.385550 sshd[5204]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:25.385000 audit[5204]: USER_END pid=5204 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.386000 audit[5204]: CRED_DISP pid=5204 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:25.388961 systemd[1]: sshd@17-10.200.8.38:22-10.200.16.10:44682.service: Deactivated successfully. Jul 2 07:58:25.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.38:22-10.200.16.10:44682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:25.390037 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:58:25.390754 systemd-logind[1395]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:58:25.391783 systemd-logind[1395]: Removed session 20. Jul 2 07:58:25.496487 systemd[1]: Started sshd@18-10.200.8.38:22-10.200.16.10:44684.service. Jul 2 07:58:25.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.38:22-10.200.16.10:44684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:26.151000 audit[5218]: USER_ACCT pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:26.152680 sshd[5218]: Accepted publickey for core from 10.200.16.10 port 44684 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:26.152000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:26.153000 audit[5218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3ba737b0 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:26.153000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:26.154641 sshd[5218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:26.160021 systemd-logind[1395]: New session 21 of user core. Jul 2 07:58:26.160663 systemd[1]: Started session-21.scope. Jul 2 07:58:26.164000 audit[5218]: USER_START pid=5218 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:26.166000 audit[5220]: CRED_ACQ pid=5220 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:26.499000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:26.499000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:26.499000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebaa80 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:26.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:26.499000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001742000 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:26.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011015bf0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:27.255000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.255000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0044e22c0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:27.256000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.256000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0044e2680 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:27.256000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.256000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011015d40 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:27.256000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.256000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011015da0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:27.257000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:27.257000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011015ef0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:58:27.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:28.155297 kernel: kauditd_printk_skb: 44 callbacks suppressed Jul 2 07:58:28.155593 kernel: audit: type=1325 audit(1719907108.145:1391): table=filter:131 family=2 entries=8 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.145000 audit[5230]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.145000 audit[5230]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd9164300 a2=0 a3=7fffd91642ec items=0 ppid=2698 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.203459 kernel: audit: type=1300 audit(1719907108.145:1391): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd9164300 a2=0 a3=7fffd91642ec items=0 ppid=2698 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.203646 kernel: audit: type=1327 audit(1719907108.145:1391): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.194000 audit[5230]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.218129 kernel: audit: type=1325 audit(1719907108.194:1392): table=nat:132 family=2 entries=22 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.218240 kernel: audit: type=1300 audit(1719907108.194:1392): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd9164300 a2=0 a3=7fffd91642ec items=0 ppid=2698 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.194000 audit[5230]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd9164300 a2=0 a3=7fffd91642ec items=0 ppid=2698 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.248459 kernel: audit: type=1327 audit(1719907108.194:1392): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.215000 audit[5232]: NETFILTER_CFG table=filter:133 family=2 entries=20 op=nft_register_rule pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.259291 kernel: audit: type=1325 audit(1719907108.215:1393): table=filter:133 family=2 entries=20 op=nft_register_rule pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.215000 audit[5232]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe43848e40 a2=0 a3=7ffe43848e2c items=0 ppid=2698 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.272980 sshd[5218]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:28.281461 kernel: audit: type=1300 audit(1719907108.215:1393): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe43848e40 a2=0 a3=7ffe43848e2c items=0 ppid=2698 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.281559 kernel: audit: type=1327 audit(1719907108.215:1393): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.279589 systemd[1]: sshd@18-10.200.8.38:22-10.200.16.10:44684.service: Deactivated successfully. Jul 2 07:58:28.280837 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:58:28.282500 systemd-logind[1395]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:58:28.283597 systemd-logind[1395]: Removed session 21. Jul 2 07:58:28.217000 audit[5232]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.301690 kernel: audit: type=1325 audit(1719907108.217:1394): table=nat:134 family=2 entries=22 op=nft_register_rule pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.217000 audit[5232]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe43848e40 a2=0 a3=0 items=0 ppid=2698 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.273000 audit[5218]: USER_END pid=5218 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:28.273000 audit[5218]: CRED_DISP pid=5218 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:28.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.38:22-10.200.16.10:44684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:28.389054 systemd[1]: Started sshd@19-10.200.8.38:22-10.200.16.10:44688.service. Jul 2 07:58:28.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.38:22-10.200.16.10:44688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:29.050000 audit[5235]: USER_ACCT pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.051705 sshd[5235]: Accepted publickey for core from 10.200.16.10 port 44688 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:29.051000 audit[5235]: CRED_ACQ pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.051000 audit[5235]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2fefbbf0 a2=3 a3=0 items=0 ppid=1 pid=5235 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:29.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:29.053205 sshd[5235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:29.058605 systemd[1]: Started session-22.scope. Jul 2 07:58:29.059122 systemd-logind[1395]: New session 22 of user core. Jul 2 07:58:29.063000 audit[5235]: USER_START pid=5235 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.065000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.669024 sshd[5235]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:29.669000 audit[5235]: USER_END pid=5235 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.670000 audit[5235]: CRED_DISP pid=5235 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:29.672916 systemd[1]: sshd@19-10.200.8.38:22-10.200.16.10:44688.service: Deactivated successfully. Jul 2 07:58:29.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.38:22-10.200.16.10:44688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:29.673958 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:58:29.675390 systemd-logind[1395]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:58:29.676552 systemd-logind[1395]: Removed session 22. Jul 2 07:58:29.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.38:22-10.200.16.10:48464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:29.781454 systemd[1]: Started sshd@20-10.200.8.38:22-10.200.16.10:48464.service. Jul 2 07:58:30.444000 audit[5245]: USER_ACCT pid=5245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:30.445615 sshd[5245]: Accepted publickey for core from 10.200.16.10 port 48464 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:30.445000 audit[5245]: CRED_ACQ pid=5245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:30.445000 audit[5245]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6b9f6b70 a2=3 a3=0 items=0 ppid=1 pid=5245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:30.447229 sshd[5245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:30.452589 systemd-logind[1395]: New session 23 of user core. Jul 2 07:58:30.453110 systemd[1]: Started session-23.scope. Jul 2 07:58:30.456000 audit[5245]: USER_START pid=5245 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:30.458000 audit[5247]: CRED_ACQ pid=5247 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.001450 sshd[5245]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:31.002000 audit[5245]: USER_END pid=5245 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.002000 audit[5245]: CRED_DISP pid=5245 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:31.005211 systemd-logind[1395]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:58:31.005322 systemd[1]: sshd@20-10.200.8.38:22-10.200.16.10:48464.service: Deactivated successfully. Jul 2 07:58:31.006487 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:58:31.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.38:22-10.200.16.10:48464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:31.007517 systemd-logind[1395]: Removed session 23. Jul 2 07:58:34.475000 audit[5264]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.480841 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 07:58:34.480958 kernel: audit: type=1325 audit(1719907114.475:1416): table=filter:135 family=2 entries=20 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.475000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd63eb9fc0 a2=0 a3=7ffd63eb9fac items=0 ppid=2698 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.514091 kernel: audit: type=1300 audit(1719907114.475:1416): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd63eb9fc0 a2=0 a3=7ffd63eb9fac items=0 ppid=2698 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:34.524311 kernel: audit: type=1327 audit(1719907114.475:1416): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:34.524379 kernel: audit: type=1325 audit(1719907114.477:1417): table=nat:136 family=2 entries=106 op=nft_register_chain pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.477000 audit[5264]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.477000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd63eb9fc0 a2=0 a3=7ffd63eb9fac items=0 ppid=2698 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.555303 kernel: audit: type=1300 audit(1719907114.477:1417): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd63eb9fc0 a2=0 a3=7ffd63eb9fac items=0 ppid=2698 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:34.565562 kernel: audit: type=1327 audit(1719907114.477:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:35.322775 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.AMhmef.mount: Deactivated successfully. Jul 2 07:58:36.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.16.10:48466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:36.113822 systemd[1]: Started sshd@21-10.200.8.38:22-10.200.16.10:48466.service. Jul 2 07:58:36.136169 kernel: audit: type=1130 audit(1719907116.113:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.16.10:48466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:36.768000 audit[5285]: USER_ACCT pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:36.788532 sshd[5285]: Accepted publickey for core from 10.200.16.10 port 48466 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:36.790136 kernel: audit: type=1101 audit(1719907116.768:1419): pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:36.789000 sshd[5285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:36.787000 audit[5285]: CRED_ACQ pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:36.813150 kernel: audit: type=1103 audit(1719907116.787:1420): pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:36.813936 systemd-logind[1395]: New session 24 of user core. Jul 2 07:58:36.816305 systemd[1]: Started session-24.scope. Jul 2 07:58:36.787000 audit[5285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb28987c0 a2=3 a3=0 items=0 ppid=1 pid=5285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:36.819000 audit[5285]: USER_START pid=5285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:36.826165 kernel: audit: type=1006 audit(1719907116.787:1421): pid=5285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:58:36.825000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:37.198000 audit[4725]: AVC avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:58:37.198000 audit[4725]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c375c0 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:58:37.198000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:37.288969 sshd[5285]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:37.289000 audit[5285]: USER_END pid=5285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:37.290000 audit[5285]: CRED_DISP pid=5285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:37.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.16.10:48466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:37.292672 systemd[1]: sshd@21-10.200.8.38:22-10.200.16.10:48466.service: Deactivated successfully. Jul 2 07:58:37.293644 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:58:37.294390 systemd-logind[1395]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:58:37.295310 systemd-logind[1395]: Removed session 24. Jul 2 07:58:37.714000 audit[4764]: AVC avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:58:37.714000 audit[4764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bf69c0 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:58:37.714000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:42.398609 systemd[1]: Started sshd@22-10.200.8.38:22-10.200.16.10:47444.service. Jul 2 07:58:42.424791 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:58:42.424865 kernel: audit: type=1130 audit(1719907122.398:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.16.10:47444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:42.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.16.10:47444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:42.970000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:42.989129 kernel: audit: type=1400 audit(1719907122.970:1430): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:42.970000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027862a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:42.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:43.013117 kernel: audit: type=1300 audit(1719907122.970:1430): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027862a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:43.013165 kernel: audit: type=1327 audit(1719907122.970:1430): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:42.970000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:43.031129 kernel: audit: type=1400 audit(1719907122.970:1431): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:42.970000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027862c0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:43.070660 kernel: audit: type=1300 audit(1719907122.970:1431): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027862c0 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:43.070786 sshd[5297]: Accepted publickey for core from 10.200.16.10 port 47444 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:43.071179 kernel: audit: type=1327 audit(1719907122.970:1431): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:42.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:43.071895 sshd[5297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:43.078229 systemd[1]: Started session-25.scope. Jul 2 07:58:43.079708 systemd-logind[1395]: New session 25 of user core. Jul 2 07:58:42.970000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:42.970000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786460 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:43.131229 kernel: audit: type=1400 audit(1719907122.970:1432): avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:43.131414 kernel: audit: type=1300 audit(1719907122.970:1432): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786460 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:43.131451 kernel: audit: type=1327 audit(1719907122.970:1432): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:42.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:42.987000 audit[2385]: AVC avc: denied { watch } for pid=2385 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:42.987000 audit[2385]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002705940 a2=fc6 a3=0 items=0 ppid=2216 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:58:42.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:43.052000 audit[5297]: USER_ACCT pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.070000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.070000 audit[5297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd68f09f80 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:43.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:43.083000 audit[5297]: USER_START pid=5297 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.086000 audit[5300]: CRED_ACQ pid=5300 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.569694 sshd[5297]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:43.570000 audit[5297]: USER_END pid=5297 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.570000 audit[5297]: CRED_DISP pid=5297 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:43.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.16.10:47444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:43.573165 systemd-logind[1395]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:58:43.573264 systemd[1]: sshd@22-10.200.8.38:22-10.200.16.10:47444.service: Deactivated successfully. Jul 2 07:58:43.574303 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:58:43.575261 systemd-logind[1395]: Removed session 25. Jul 2 07:58:48.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.16.10:44282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:48.679347 systemd[1]: Started sshd@23-10.200.8.38:22-10.200.16.10:44282.service. Jul 2 07:58:48.684373 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:58:48.684454 kernel: audit: type=1130 audit(1719907128.678:1442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.16.10:44282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:49.329753 sshd[5318]: Accepted publickey for core from 10.200.16.10 port 44282 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:49.328000 audit[5318]: USER_ACCT pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.331831 sshd[5318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:49.351336 kernel: audit: type=1101 audit(1719907129.328:1443): pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.330000 audit[5318]: CRED_ACQ pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.360736 systemd[1]: Started session-26.scope. Jul 2 07:58:49.362440 systemd-logind[1395]: New session 26 of user core. Jul 2 07:58:49.371245 kernel: audit: type=1103 audit(1719907129.330:1444): pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.330000 audit[5318]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5952f6b0 a2=3 a3=0 items=0 ppid=1 pid=5318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:49.398351 kernel: audit: type=1006 audit(1719907129.330:1445): pid=5318 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 07:58:49.398490 kernel: audit: type=1300 audit(1719907129.330:1445): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5952f6b0 a2=3 a3=0 items=0 ppid=1 pid=5318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:49.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:49.409425 kernel: audit: type=1327 audit(1719907129.330:1445): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:49.409532 kernel: audit: type=1105 audit(1719907129.366:1446): pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.366000 audit[5318]: USER_START pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.366000 audit[5320]: CRED_ACQ pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.444452 kernel: audit: type=1103 audit(1719907129.366:1447): pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.881965 sshd[5318]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:49.882000 audit[5318]: USER_END pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.885926 systemd-logind[1395]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:58:49.887476 systemd[1]: sshd@23-10.200.8.38:22-10.200.16.10:44282.service: Deactivated successfully. Jul 2 07:58:49.888308 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:58:49.889915 systemd-logind[1395]: Removed session 26. Jul 2 07:58:49.882000 audit[5318]: CRED_DISP pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.918593 kernel: audit: type=1106 audit(1719907129.882:1448): pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.918715 kernel: audit: type=1104 audit(1719907129.882:1449): pid=5318 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:49.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.16.10:44282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:50.739017 systemd[1]: run-containerd-runc-k8s.io-d6ab3e51f16da0b0d4b925c42335a8462c9ed26b4d8b48bbc88162f9d0dad811-runc.AjgMZA.mount: Deactivated successfully. Jul 2 07:58:53.354035 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.YUCx7A.mount: Deactivated successfully. Jul 2 07:58:54.991499 systemd[1]: Started sshd@24-10.200.8.38:22-10.200.16.10:44296.service. Jul 2 07:58:55.015456 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:55.015594 kernel: audit: type=1130 audit(1719907134.991:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.16.10:44296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:54.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.16.10:44296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:55.641000 audit[5374]: USER_ACCT pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.662076 sshd[5374]: Accepted publickey for core from 10.200.16.10 port 44296 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:58:55.662503 kernel: audit: type=1101 audit(1719907135.641:1452): pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.662778 sshd[5374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:55.660000 audit[5374]: CRED_ACQ pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.668550 systemd[1]: Started session-27.scope. Jul 2 07:58:55.669798 systemd-logind[1395]: New session 27 of user core. Jul 2 07:58:55.692544 kernel: audit: type=1103 audit(1719907135.660:1453): pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.692653 kernel: audit: type=1006 audit(1719907135.660:1454): pid=5374 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 07:58:55.692682 kernel: audit: type=1300 audit(1719907135.660:1454): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe79864a10 a2=3 a3=0 items=0 ppid=1 pid=5374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:55.660000 audit[5374]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe79864a10 a2=3 a3=0 items=0 ppid=1 pid=5374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:55.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:55.720266 kernel: audit: type=1327 audit(1719907135.660:1454): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:55.720350 kernel: audit: type=1105 audit(1719907135.676:1455): pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.676000 audit[5374]: USER_START pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.739248 kernel: audit: type=1103 audit(1719907135.680:1456): pid=5376 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:55.680000 audit[5376]: CRED_ACQ pid=5376 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.157072 sshd[5374]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:56.157000 audit[5374]: USER_END pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.160354 systemd[1]: sshd@24-10.200.8.38:22-10.200.16.10:44296.service: Deactivated successfully. Jul 2 07:58:56.161201 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 07:58:56.162816 systemd-logind[1395]: Session 27 logged out. Waiting for processes to exit. Jul 2 07:58:56.163765 systemd-logind[1395]: Removed session 27. Jul 2 07:58:56.157000 audit[5374]: CRED_DISP pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.179123 kernel: audit: type=1106 audit(1719907136.157:1457): pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.179174 kernel: audit: type=1104 audit(1719907136.157:1458): pid=5374 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:58:56.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.16.10:44296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:01.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.16.10:41686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:01.267846 systemd[1]: Started sshd@25-10.200.8.38:22-10.200.16.10:41686.service. Jul 2 07:59:01.272955 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:01.273071 kernel: audit: type=1130 audit(1719907141.266:1460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.16.10:41686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:01.923000 audit[5398]: USER_ACCT pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.943640 sshd[5398]: Accepted publickey for core from 10.200.16.10 port 41686 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:59:01.944129 kernel: audit: type=1101 audit(1719907141.923:1461): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.944145 sshd[5398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:01.942000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.954597 systemd[1]: Started session-28.scope. Jul 2 07:59:01.955163 systemd-logind[1395]: New session 28 of user core. Jul 2 07:59:01.974140 kernel: audit: type=1103 audit(1719907141.942:1462): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.974269 kernel: audit: type=1006 audit(1719907141.942:1463): pid=5398 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jul 2 07:59:01.974434 kernel: audit: type=1300 audit(1719907141.942:1463): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd27c72d0 a2=3 a3=0 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.942000 audit[5398]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd27c72d0 a2=3 a3=0 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.997331 kernel: audit: type=1327 audit(1719907141.942:1463): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:01.997443 kernel: audit: type=1105 audit(1719907141.961:1464): pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:01.961000 audit[5398]: USER_START pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:01.963000 audit[5400]: CRED_ACQ pid=5400 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.016124 kernel: audit: type=1103 audit(1719907141.963:1465): pid=5400 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.444450 sshd[5398]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:02.445000 audit[5398]: USER_END pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.448830 systemd[1]: sshd@25-10.200.8.38:22-10.200.16.10:41686.service: Deactivated successfully. Jul 2 07:59:02.449876 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 07:59:02.451615 systemd-logind[1395]: Session 28 logged out. Waiting for processes to exit. Jul 2 07:59:02.452618 systemd-logind[1395]: Removed session 28. Jul 2 07:59:02.445000 audit[5398]: CRED_DISP pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.481186 kernel: audit: type=1106 audit(1719907142.445:1466): pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.481304 kernel: audit: type=1104 audit(1719907142.445:1467): pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:59:02.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.16.10:41686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:05.315913 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.zlqv31.mount: Deactivated successfully. Jul 2 07:59:16.639000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:59:16.640741 systemd[1]: cri-containerd-fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d.scope: Deactivated successfully. Jul 2 07:59:16.641142 systemd[1]: cri-containerd-fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d.scope: Consumed 5.087s CPU time. Jul 2 07:59:16.651311 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:16.651443 kernel: audit: type=1334 audit(1719907156.639:1469): prog-id=115 op=UNLOAD Jul 2 07:59:16.652000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:59:16.660125 kernel: audit: type=1334 audit(1719907156.652:1470): prog-id=118 op=UNLOAD Jul 2 07:59:16.667338 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d-rootfs.mount: Deactivated successfully. Jul 2 07:59:16.668950 env[1407]: time="2024-07-02T07:59:16.668900824Z" level=info msg="shim disconnected" id=fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d Jul 2 07:59:16.669437 env[1407]: time="2024-07-02T07:59:16.668953424Z" level=warning msg="cleaning up after shim disconnected" id=fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d namespace=k8s.io Jul 2 07:59:16.669437 env[1407]: time="2024-07-02T07:59:16.668969924Z" level=info msg="cleaning up dead shim" Jul 2 07:59:16.676686 env[1407]: time="2024-07-02T07:59:16.676651272Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5456 runtime=io.containerd.runc.v2\n" Jul 2 07:59:17.419354 systemd[1]: cri-containerd-84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf.scope: Deactivated successfully. Jul 2 07:59:17.419686 systemd[1]: cri-containerd-84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf.scope: Consumed 3.667s CPU time. Jul 2 07:59:17.421000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:59:17.421000 audit: BPF prog-id=99 op=UNLOAD Jul 2 07:59:17.433962 kernel: audit: type=1334 audit(1719907157.421:1471): prog-id=82 op=UNLOAD Jul 2 07:59:17.434087 kernel: audit: type=1334 audit(1719907157.421:1472): prog-id=99 op=UNLOAD Jul 2 07:59:17.454637 env[1407]: time="2024-07-02T07:59:17.445045667Z" level=info msg="shim disconnected" id=84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf Jul 2 07:59:17.454637 env[1407]: time="2024-07-02T07:59:17.445185568Z" level=warning msg="cleaning up after shim disconnected" id=84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf namespace=k8s.io Jul 2 07:59:17.454637 env[1407]: time="2024-07-02T07:59:17.445213069Z" level=info msg="cleaning up dead shim" Jul 2 07:59:17.453230 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf-rootfs.mount: Deactivated successfully. Jul 2 07:59:17.456977 env[1407]: time="2024-07-02T07:59:17.456930542Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5486 runtime=io.containerd.runc.v2\n" Jul 2 07:59:17.739335 kubelet[2521]: I0702 07:59:17.738493 2521 scope.go:117] "RemoveContainer" containerID="fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d" Jul 2 07:59:17.742147 kubelet[2521]: I0702 07:59:17.742094 2521 scope.go:117] "RemoveContainer" containerID="84edc3f58737f6685f6adb5d005e01d0d1528e7371e9e371d1288047e88f15cf" Jul 2 07:59:17.743559 env[1407]: time="2024-07-02T07:59:17.743493927Z" level=info msg="CreateContainer within sandbox \"0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 07:59:17.746286 env[1407]: time="2024-07-02T07:59:17.746245344Z" level=info msg="CreateContainer within sandbox \"9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 07:59:17.807079 env[1407]: time="2024-07-02T07:59:17.807026123Z" level=info msg="CreateContainer within sandbox \"0c9a649cd9bd8d788b796e404f5a0cbb90188b42aa7740854c74580a5ea5716b\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd\"" Jul 2 07:59:17.807972 env[1407]: time="2024-07-02T07:59:17.807935628Z" level=info msg="StartContainer for \"ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd\"" Jul 2 07:59:17.811000 env[1407]: time="2024-07-02T07:59:17.810959647Z" level=info msg="CreateContainer within sandbox \"9f2b9f6c62fe23d4da025213988befb6ab7c685d17e6d13223e567e0bc03023c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"a7a06adcc11e89f5cab69b2f6b857281f8c7247c7d5eb2680afa7d0ee3734d9e\"" Jul 2 07:59:17.811672 env[1407]: time="2024-07-02T07:59:17.811637951Z" level=info msg="StartContainer for \"a7a06adcc11e89f5cab69b2f6b857281f8c7247c7d5eb2680afa7d0ee3734d9e\"" Jul 2 07:59:17.844854 systemd[1]: Started cri-containerd-ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd.scope. Jul 2 07:59:17.854428 systemd[1]: Started cri-containerd-a7a06adcc11e89f5cab69b2f6b857281f8c7247c7d5eb2680afa7d0ee3734d9e.scope. Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.890223 kernel: audit: type=1400 audit(1719907157.875:1473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.919046 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:59:17.919185 kernel: audit: audit_lost=35 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:59:17.919214 kernel: audit: backlog limit exceeded Jul 2 07:59:17.919241 kernel: audit: type=1400 audit(1719907157.875:1474): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.919276 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.889000 audit: BPF prog-id=194 op=LOAD Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2605 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361366138313166376563353337666665346366623731323230303830 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2605 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361366138313166376563353337666665346366623731323230303830 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit: BPF prog-id=195 op=LOAD Jul 2 07:59:17.891000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6ee0 items=0 ppid=2605 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361366138313166376563353337666665346366623731323230303830 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit: BPF prog-id=196 op=LOAD Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6f28 items=0 ppid=2605 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361366138313166376563353337666665346366623731323230303830 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit: BPF prog-id=196 op=UNLOAD Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit: BPF prog-id=195 op=UNLOAD Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2216 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613036616463633131653839663563616236396232663662383537 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit: BPF prog-id=199 op=LOAD Jul 2 07:59:17.923000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000253c0 items=0 ppid=2216 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613036616463633131653839663563616236396232663662383537 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit: BPF prog-id=200 op=LOAD Jul 2 07:59:17.923000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025408 items=0 ppid=2216 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613036616463633131653839663563616236396232663662383537 Jul 2 07:59:17.923000 audit: BPF prog-id=200 op=UNLOAD Jul 2 07:59:17.923000 audit: BPF prog-id=199 op=UNLOAD Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:17.923000 audit: BPF prog-id=201 op=LOAD Jul 2 07:59:17.923000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025818 items=0 ppid=2216 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613036616463633131653839663563616236396232663662383537 Jul 2 07:59:17.891000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7338 items=0 ppid=2605 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:17.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361366138313166376563353337666665346366623731323230303830 Jul 2 07:59:17.956072 env[1407]: time="2024-07-02T07:59:17.956012351Z" level=info msg="StartContainer for \"ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd\" returns successfully" Jul 2 07:59:17.983395 env[1407]: time="2024-07-02T07:59:17.983332321Z" level=info msg="StartContainer for \"a7a06adcc11e89f5cab69b2f6b857281f8c7247c7d5eb2680afa7d0ee3734d9e\" returns successfully" Jul 2 07:59:18.898899 kubelet[2521]: E0702 07:59:18.898850 2521 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.38:53214->10.200.8.21:2379: read: connection timed out" Jul 2 07:59:18.906862 systemd[1]: cri-containerd-c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a.scope: Deactivated successfully. Jul 2 07:59:18.907221 systemd[1]: cri-containerd-c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a.scope: Consumed 1.884s CPU time. Jul 2 07:59:18.909000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:59:18.909000 audit: BPF prog-id=94 op=UNLOAD Jul 2 07:59:18.934777 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a-rootfs.mount: Deactivated successfully. Jul 2 07:59:18.935287 env[1407]: time="2024-07-02T07:59:18.935238828Z" level=info msg="shim disconnected" id=c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a Jul 2 07:59:18.935746 env[1407]: time="2024-07-02T07:59:18.935721631Z" level=warning msg="cleaning up after shim disconnected" id=c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a namespace=k8s.io Jul 2 07:59:18.935862 env[1407]: time="2024-07-02T07:59:18.935845932Z" level=info msg="cleaning up dead shim" Jul 2 07:59:18.945605 env[1407]: time="2024-07-02T07:59:18.945568092Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5587 runtime=io.containerd.runc.v2\n" Jul 2 07:59:19.001000 audit[5545]: AVC avc: denied { watch } for pid=5545 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:19.001000 audit[5545]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b880f0 a2=fc6 a3=0 items=0 ppid=2216 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:59:19.001000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:19.002000 audit[5545]: AVC avc: denied { watch } for pid=5545 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:19.002000 audit[5545]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00022f0e0 a2=fc6 a3=0 items=0 ppid=2216 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c630,c683 key=(null) Jul 2 07:59:19.002000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:19.752689 kubelet[2521]: I0702 07:59:19.752649 2521 scope.go:117] "RemoveContainer" containerID="c326bdc8721ff6a482074cb0e8bb6f2e60ea63c6bb2edb4066ffa6b41cfecf1a" Jul 2 07:59:19.754876 env[1407]: time="2024-07-02T07:59:19.754827794Z" level=info msg="CreateContainer within sandbox \"28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 07:59:19.785034 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4031500472.mount: Deactivated successfully. Jul 2 07:59:19.797937 env[1407]: time="2024-07-02T07:59:19.797891061Z" level=info msg="CreateContainer within sandbox \"28676213178636152807c7472607b0f3dd34fb775afd1fc92b61d838f0474e1f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"f994cc83aebbd172274bb4342eb2842aacbe6b175e1866331ff71e5687648857\"" Jul 2 07:59:19.798561 env[1407]: time="2024-07-02T07:59:19.798519765Z" level=info msg="StartContainer for \"f994cc83aebbd172274bb4342eb2842aacbe6b175e1866331ff71e5687648857\"" Jul 2 07:59:19.822253 systemd[1]: Started cri-containerd-f994cc83aebbd172274bb4342eb2842aacbe6b175e1866331ff71e5687648857.scope. Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.844000 audit: BPF prog-id=202 op=LOAD Jul 2 07:59:19.845000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.845000 audit[5608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2254 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393463633833616562626431373232373462623433343265623238 Jul 2 07:59:19.845000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.845000 audit[5608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2254 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393463633833616562626431373232373462623433343265623238 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit: BPF prog-id=203 op=LOAD Jul 2 07:59:19.846000 audit[5608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000380300 items=0 ppid=2254 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393463633833616562626431373232373462623433343265623238 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.846000 audit: BPF prog-id=204 op=LOAD Jul 2 07:59:19.846000 audit[5608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000380348 items=0 ppid=2254 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393463633833616562626431373232373462623433343265623238 Jul 2 07:59:19.847000 audit: BPF prog-id=204 op=UNLOAD Jul 2 07:59:19.847000 audit: BPF prog-id=203 op=UNLOAD Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:19.847000 audit: BPF prog-id=205 op=LOAD Jul 2 07:59:19.847000 audit[5608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000380758 items=0 ppid=2254 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:19.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393463633833616562626431373232373462623433343265623238 Jul 2 07:59:19.881210 env[1407]: time="2024-07-02T07:59:19.881143375Z" level=info msg="StartContainer for \"f994cc83aebbd172274bb4342eb2842aacbe6b175e1866331ff71e5687648857\" returns successfully" Jul 2 07:59:20.780934 systemd[1]: run-containerd-runc-k8s.io-f994cc83aebbd172274bb4342eb2842aacbe6b175e1866331ff71e5687648857-runc.64UpSx.mount: Deactivated successfully. Jul 2 07:59:21.265804 kubelet[2521]: E0702 07:59:21.265764 2521 event.go:346] "Server rejected event (will not retry!)" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.38:53022->10.200.8.21:2379: read: connection timed out" event="&Event{ObjectMeta:{kube-apiserver-ci-3510.3.5-a-cc7572d280.17de5670f10513db kube-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:kube-system,Name:kube-apiserver-ci-3510.3.5-a-cc7572d280,UID:8209a3d4786f89b63e71d2a90e139c74,APIVersion:v1,ResourceVersion:,FieldPath:spec.containers{kube-apiserver},},Reason:Unhealthy,Message:Readiness probe failed: HTTP probe failed with statuscode: 500,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-cc7572d280,},FirstTimestamp:2024-07-02 07:59:10.782075867 +0000 UTC m=+219.877954729,LastTimestamp:2024-07-02 07:59:10.782075867 +0000 UTC m=+219.877954729,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-cc7572d280,}" Jul 2 07:59:27.256000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.261516 kernel: kauditd_printk_skb: 179 callbacks suppressed Jul 2 07:59:27.261630 kernel: audit: type=1400 audit(1719907167.256:1530): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.256000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.293705 kernel: audit: type=1400 audit(1719907167.256:1529): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.293814 kernel: audit: type=1300 audit(1719907167.256:1530): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007b230a0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.256000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007b230a0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.330710 kernel: audit: type=1327 audit(1719907167.256:1530): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.330813 kernel: audit: type=1400 audit(1719907167.257:1531): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.257000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.347536 kernel: audit: type=1300 audit(1719907167.257:1531): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009f3af90 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009f3af90 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.369114 kernel: audit: type=1327 audit(1719907167.257:1531): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.257000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.399017 kernel: audit: type=1400 audit(1719907167.257:1532): avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.399134 kernel: audit: type=1300 audit(1719907167.257:1532): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007b232e0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007b232e0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.257000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.257000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009f3aff0 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.257000 audit[2355]: AVC avc: denied { watch } for pid=2355 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:27.257000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009f3b170 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.256000 audit[2355]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009b2c840 a2=fc6 a3=0 items=0 ppid=2204 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c575,c761 key=(null) Jul 2 07:59:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:27.435131 kernel: audit: type=1327 audit(1719907167.257:1532): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:28.176562 kubelet[2521]: I0702 07:59:28.176507 2521 status_manager.go:853] "Failed to get status for pod" podUID="19c6490a-ddec-4fc8-9ce5-58c48d400326" pod="tigera-operator/tigera-operator-76c4974c85-8m678" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.38:53120->10.200.8.21:2379: read: connection timed out" Jul 2 07:59:28.899876 kubelet[2521]: E0702 07:59:28.899814 2521 controller.go:195] "Failed to update lease" err="Put \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-cc7572d280?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:29.459000 audit: BPF prog-id=194 op=UNLOAD Jul 2 07:59:29.460389 systemd[1]: cri-containerd-ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd.scope: Deactivated successfully. Jul 2 07:59:29.463000 audit: BPF prog-id=198 op=UNLOAD Jul 2 07:59:29.482306 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd-rootfs.mount: Deactivated successfully. Jul 2 07:59:29.552132 env[1407]: time="2024-07-02T07:59:29.552053767Z" level=info msg="shim disconnected" id=ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd Jul 2 07:59:29.552697 env[1407]: time="2024-07-02T07:59:29.552158768Z" level=warning msg="cleaning up after shim disconnected" id=ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd namespace=k8s.io Jul 2 07:59:29.552697 env[1407]: time="2024-07-02T07:59:29.552174068Z" level=info msg="cleaning up dead shim" Jul 2 07:59:29.561363 env[1407]: time="2024-07-02T07:59:29.561313423Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:59:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5674 runtime=io.containerd.runc.v2\n" Jul 2 07:59:29.780969 kubelet[2521]: I0702 07:59:29.780840 2521 scope.go:117] "RemoveContainer" containerID="fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d" Jul 2 07:59:29.781728 kubelet[2521]: I0702 07:59:29.781659 2521 scope.go:117] "RemoveContainer" containerID="ca6a811f7ec537ffe4cfb712200808fbe5f735b8523c9da4393efcd114fbb0cd" Jul 2 07:59:29.782130 kubelet[2521]: E0702 07:59:29.782088 2521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-76c4974c85-8m678_tigera-operator(19c6490a-ddec-4fc8-9ce5-58c48d400326)\"" pod="tigera-operator/tigera-operator-76c4974c85-8m678" podUID="19c6490a-ddec-4fc8-9ce5-58c48d400326" Jul 2 07:59:29.783277 env[1407]: time="2024-07-02T07:59:29.783234944Z" level=info msg="RemoveContainer for \"fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d\"" Jul 2 07:59:29.792876 env[1407]: time="2024-07-02T07:59:29.792836001Z" level=info msg="RemoveContainer for \"fde053a87ff5e76271aa21e3758bf92a3d0794269527e6c55b449e61f8ef524d\" returns successfully" Jul 2 07:59:35.311359 systemd[1]: run-containerd-runc-k8s.io-836590deb852bc64ce1a47984ed91142420180e1bf941d70bda9fd0e62fc989a-runc.5emIx8.mount: Deactivated successfully. Jul 2 07:59:37.198000 audit[4725]: AVC avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:59:37.204217 kernel: kauditd_printk_skb: 10 callbacks suppressed Jul 2 07:59:37.204362 kernel: audit: type=1400 audit(1719907177.198:1537): avc: denied { watch } for pid=4725 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.2053482241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c390 tclass=file permissive=0 Jul 2 07:59:37.198000 audit[4725]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c36560 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:59:37.243877 kernel: audit: type=1300 audit(1719907177.198:1537): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c36560 a2=fc6 a3=0 items=0 ppid=4598 pid=4725 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c390 key=(null) Jul 2 07:59:37.244047 kernel: audit: type=1327 audit(1719907177.198:1537): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:37.198000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:37.716000 audit[4764]: AVC avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:59:37.716000 audit[4764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bf6000 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:59:37.758520 kernel: audit: type=1400 audit(1719907177.716:1538): avc: denied { watch } for pid=4764 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_56_32.3312822555/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c380 tclass=file permissive=0 Jul 2 07:59:37.758666 kernel: audit: type=1300 audit(1719907177.716:1538): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bf6000 a2=fc6 a3=0 items=0 ppid=4635 pid=4764 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c380 key=(null) Jul 2 07:59:37.758707 kernel: audit: type=1327 audit(1719907177.716:1538): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:37.716000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:38.900987 kubelet[2521]: E0702 07:59:38.900926 2521 request.go:1116] Unexpected error when reading response body: net/http: request canceled (Client.Timeout or context cancellation while reading body) Jul 2 07:59:38.901609 kubelet[2521]: E0702 07:59:38.901027 2521 controller.go:195] "Failed to update lease" err="unexpected error when reading response body. Please retry. Original error: net/http: request canceled (Client.Timeout or context cancellation while reading body)"